home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun Mar 29, 1992 Volume 4 : Issue .15
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Associate Editor: Etaion Shrdlu
- Arcmeisters: Brian Kehoe and Bob Kusumoto
-
- CONTENTS, #4.15 (Mar 29, 1992)
- File 1--Reader Reply--Don't "Say YES! to Business Rates." (CuD 4.11)
- File 2--Information wanted on Censorship in Cyberspace
- File 3--Reader Reply Cybernetic Candidate (CuD #4.14)
- File 4--"Sun Devil" becomes new SJG Game
- File 5--Electronic FOIA/April 2 hearing
- File 6--Penn. Supreme Ct. Bars Call
- File 7--Pedophilia, Computers and Children
- File 8--CFP-2: Sterling Speaks For "The Unspeakable" (NEWSBYTES reprint)
- File 9--CFP-2 Features Role-Playing FBI Scenario (NEWSBYTES reprint)
- File 10--Electronic CivLib - model candidate's statement & ideas
-
- Issues of CuD can be found in the Usenet alt.society.cu-digest news
- group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
- and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
- 789-4210, and by anonymous ftp from ftp.eff.org (192.88.144.4),
- chsun1.spc.uchicago.edu, and ftp.ee.mu.oz.au. To use the U. of
- Chicago email server, send mail with the subject "help" (without the
- quotes) to archive-server@chsun1.spc.uchicago.edu.
- European distributor: ComNet in Luxembourg BBS (++352) 466893.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source
- is cited. Some authors do copyright their material, and they should
- be contacted for reprint permission. It is assumed that non-personal
- mail to the moderators may be reprinted unless otherwise specified.
- Readers are encouraged to submit reasoned articles relating to
- computer culture and communication. Articles are preferred to short
- responses. Please avoid quoting previous posts unless absolutely
- necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Tue, 24 Mar 1992 11:19:17 EST
- From: "Charles Purwin, Systems, purwinc@woods.ulowell.edu"@UNKNOWN.DOMAIN
- Subject: File 1--Reader Reply--Don't "Say YES! to Business Rates." (CuD 4.11)
-
- I have to object to Michael E. Marotta's article in CUD #4.11, where
- he seems to take the stand that BBS's operators should pay business
- lines.
-
- His two views are both limited in scope and understanding of the issue
- at hand. Some of the items he speaks about in his "Home Data Center"
- are not really the informational tools he alludes them to actually be.
- Camcorders nor copiers are informational tools, they can be viewed as
- tools for capture and duplication of information but are not in
- themselves informational tools. TV's are at best a nominal
- information distributer, the tripe heavily outweighs the 6 o'clock
- news. Books, magazines and newspapers definitely are decent ways to
- get across information, but tend to be found densely in a home than a
- TV. Again in the same paragraph he states that "EVERY BBS USER IS A
- SYSOP." Now I don't know if Mr. Marotta has ever seen or used a BBS,
- but that statement leads me to believe that he has not. I associate
- with BBS operators and I see first hand the work and time they put in
- to keep a BBS running. If every user was a sysop then we would truely
- either have a few excellent bbs's or many that are simply run to the
- verge of anarchy. No average user, excluding obviously other sysops,
- can be alluded to being a sysop that is impossible. It is true that
- data travels from home to home, but what is voice? Last time I looked
- it is data also.
-
- In his following statements on "The Home Treasury", Mr. Marotta feels
- that "anyone can build a car; most people choose not to." PLEASE! I
- know many people that would not have a clue on how to put two pieces
- of wood together, never mind a car. That type of senseless comparison
- is not endearing to anyone. I think most people know that your
- checkbook is your general ledger that is usually a common thing. I
- don't see what a dishwasher or adding machine have to do with your
- phone rate! There is no comparision here. The basis for a phone rate
- should lie more so in the fact it being either commercial/private
- /public/non-profit and not if you have a dishwasher.
-
- Well most businesses can afford a commercial phone number. But they
- are in the market to make money, where as a BBS IS NOT. Now I know
- there are exceptions to the rule, BUT 90% do not ask for money up
- front as a requirement, as a business would do. They just ask that
- you help them if you can, a donation or whatever you want to call it.
-
- I can't make heads or tails of the last paragraph, I guess my english
- is just not refined enough. In closing, BBS operators do not deserve
- to be charged commercial rates, because in fact they are not a
- business in the classical sense. Now I see no reason that the telco
- could not come to an agreement on a rate that would reflect the usage
- a line would be getting because of BBS usage.
-
- ------------------------------
-
- Date: Sun, 22 Mar 92 13:16 EST
- From: "Michael E. Marotta" <MERCURY@LCC.EDU>
- Subject: File 2--Information wanted on Censorship in Cyberspace
-
-
- I have been hired to write an article about the control of information
- in cyberspace. We all know that Fidonet moderators and sysops devote
- their OWN resources for us to use. There is no question about the
- "right" of the sysop or moderator to delete messages and users. The
- practice of censorship is nonetheless newsworthy.
-
- If YOU have experienced censorship on Fidonet or Usenet, or Prodigy or
- CompuServe, or another BBS or network, I am interested in learning
- about your story. If you can supply downloads of actual encounters,
- so much the better.
-
- If you have ever been censored, send me physical world mail about the
- event.
-
- Michael E. Marotta
- 5751 Richwood #34
- Lansing, Mich. 48911
- USA
-
- ------------------------------
-
- Date: Thu, 26 Mar 92 14:34:54 EST
- From: Stephen Dennett <sdennett@SALES.STERN.NYU.EDU>
- Subject: File 3--Reader Reply--Cybernetic Candidate (CuD #4.14)
-
- > A few weeks ago I asked Congressman Tom Lantos' staff how he voted
- > last year. Their initial response was to hand me the glossy
- > advertising brochure that our tax dollars paid for. When pressed to
- > find out how he voted, or didn't vote, I was ushered into their
- > library, shown to the Congressional Record, and told to look it up
- > myself day by day.
-
- The PRODIGY service has a database with the voting records of all
- current candidates available online (done with the League of Women
- voters or some such group). You might want to contact them about
- getting listed (they list candidates with no records also).
-
- ------------------------------
-
- Date: Wed, 25 Mar 92 11:00:38 -0600
- From: sjackson@TIC.COM(Steve Jackson)
- Subject: File 4--"Sun Devil" becomes new SJG Game
-
- In 1990, the Secret Service raided Steve Jackson Games when a "hacker
- hunt" went out of control. Loss of our computers and unfinished game
- manuscripts almost put this company out of business.
-
- It's been two years. We're back on our feet. And ever since the raid,
- fans have been asking "When are you going to make a game out of it?"
-
- Okay. We give up. Here it is.
-
- In HACKER, players compete to invade the most computer systems. The
- more systems you crack, the more you learn, and the easier the next
- target is. You can find back doors and secret phone lines, and even
- crash the systems your rivals are using. But be careful. There's a
- Secret Service Raid with your name on it if you make too many enemies.
-
- Designed by Steve Jackson, the game was based on the award-winning
- ILLUMINATI. To win at HACKER requires guile and diplomacy. You must
- trade favors with your fellow hackers - and get more than you give
- away. But jealous rivals will try to bust you. Three busts and you're
- out of the game. More than one player can win, but shared victories
- are not easy!
-
- HACKER is for 3-6 players. Playing time is under an hour for the short
- game and about 2 hours for the regular game. Components include a rule
- book, 110 cards, marker chips, 6 console units, system upgrades, Bust
- markers and Net Ninja marker, two dice and a ziplock bag.
-
- Hacker begins shipping March 30, and has a suggested retail price of
- $19.95.
-
- ------------------------------
-
- Date: Fri, 13 Mar 1992 13:06:33 CST
- Sender: Activists Mailing List <ACTIV-L@UMCVMB.BITNET>
- From: James P Love <LOVE@PUCC.BITNET>
- Subject: File 5-- Electronic FOIA/April 2 hearing
-
- On April 2, 1992 the Senate Subcommittee on Technology and the Law
- will hold a public hearing on S. 1940, Senator Leahy's "Electronic
- Freedom of Information Improvement Act of 1991." This important
- legislation addresses the issue of the availability of electronic
- records under the Freedom of Information Act.
-
- A number of persons have asked how Senator Leahy's Electronic FOIA
- bill (S. 1940) relates to Representative Owens' Improvement of
- Information Access Act (IIA Act, HR 3459), which also amends the
- Freedom of Information Act. The _short_ answer is that S. 1940 would
- strengthen the public's rights to receive electronic records that are
- subject to a FOIA request, while the Owens bill would enhance access
- by improving the scope and performance of agency information products
- and services. The principal opposition to the Leahy bill comes from
- federal agencies who do not like FOIA responsiblities, while the
- principal opposition to the Owens bill comes from commercial data
- vendors who don't want new government information products and
- services. We plan to provide a more detailed discussion of the two
- bills in a few days.
-
- Senator Leahy wants to use the April 2, 1992 hearing to develop a
- record of the problems the public has in receiving electronic records
- from agencies. We are preparing a statement which will address
- several issues, including, among other things:
-
- - the Federal Reserve Bank's use of NTIS to sell the
- electronic copy of its bank call reports for $500 a tape,
- rather than releasing the information under a FOIA request
- for the cost of copying the information,
-
- - the SEC/Mead contract that will prevent the electronic copy
- of EDGAR database from being available under FOIA, and
-
- - the Department of Justice/WESTLAW contract which prevents
- the public from obtaining large portions of the JURIS
- database under FOIA.
-
-
- We would be very interested in learning about _ANY_ problems people
- have had receiving electronic records under FOIA.
-
- For more information about S. 1940 or the April 2, 1992 hearing,
- contact Cathy Russell, Counsel to the Subcomittee, at 202-224-3406, or
- write to her at 815 Senate Hart Building, Washington, DC 20510.
-
- ------------------------------
-
- Date: Mon, 23 Mar 1992 15:49:09 EDT
- From: Dave Banisar <banisar@WASHOFC.CPSR.ORG>
- Subject: File 6--Penn. Supreme Ct. Bars Call
-
- Penn. Supreme Ct. Bars Caller Id
-
- From: March 23, 1992 Comm. Daily
-
- PA. SUPREME COURT THROWS OUT UNBLOCKED CALLER ID
-
- Pa. state Supreme Court last week upheld lower court rulings that
- unblocked Caller ID service would violate state wiretap laws, but
- left open significant question whether any form of blocking would
- satisfy legal requirements. March 18 decision by Judge Nicholas
- Papadakos for 7-member court said service violated state law "because
- it is being used for unlimited purposes without the 'consent' of each
- of the users of the telephone service." PUC had approved service in
- 1989 without blocking, and was challenged in court by then-Consumer
- Advocate David Barasch. Bell of Pa. had argued that Caller ID was
- legal trap-and-trace device operated by telephone company, but Barasch
- and others had said that 2 traps were being used -- one by telephone
- company, which may be exempt from law, and one by customer's Caller
- ID device. Court ruled state wiretapping law requires that "consent
- to any form of interception must be obtained from all parties."
-
- Ruling didn't reach questions whether Caller ID was constitutional,
- or what forms of blocking would suffice to meet state requirements. In
- oral argument, telephone company changed its policy and said it would
- offer per-call blocking. Bell of Pa. spokesman Saul Kohler said that
- ruling "clears the way for Caller ID to be offered" with per-call
- blocking, and that company was pleased service wasn't found to be
- unconstitutional. There's no timetable for proposing service, he said.
- But Irwin Popowski, who succeeded Barasch as Consumer Advocate, said
- it's open question whether per-call blocking is adequate. Popowski
- wouldn't say what blocking standard his office would support, but
- noted that trend of regulatory decisions around country lately has
- been to include per-line blocking in mix of services. There's "real
- question" whether per-line blocking should be offered, he said.
-
- PUC Vice Chmn. Joseph Rhodes, who wrote 1978 privacy law while in
- legislature, said it's possible that any new Bell proposal could lead
- to another 3 years of litigation. He called decision "triumph for
- privacy," and said Bell statement claiming victory was "an absurd
- attempt to distort what the Supreme Court decided." Rhodes called on
- Bell to confer with Caller ID opponents to try to find solution, and
- for company to put more emphasis on Call Trace.
-
- ------------------------------
-
- Date: Wed, 25 Mar 1992 15:44:51 EST
- From: anonymous@cont.edu
- Subject: File 7--Pedophilia, Computers and Children
-
- ====
- NEWS RELEASE Immediate 3/18/92
-
- PEDOPHILIA, COMPUTERS AND CHILDREN
-
- If you have children in your home and a home computer complete with a
- telephone modum, you [sic] child is in potential danger of coming in
- contact with deviate and dangerous criminals.
-
- Using the computer modum [sic], these unsavory individuals can
- communicate directly with your child without your knowledge. Just as
- importantly, you should be concerned if your child has a friendship
- with other youth who have access to this equipment in an unsupervised
- environment.
-
- Using a computer and a modum your child can readily access community
- "bulletin boards" and receive sexually explicit and graphic material
- from total strangers who can converse with your children, individuals
- you quite probably wouldn't even talk with.
-
- The concern becomes more poignant when stated otherwise; would you let
- a child molester, murderer, convicted criminal into your home to meet
- alone with your child?
-
- According to Fresno Police Detective Frank Clark "your child can be in
- real danger from pedophiles, rapists, satanic cultists and other
- criminals knows to be actively engaged in computer conversation.
- Unwittingly, naive children with a natural curiosity can be victimized;
- emerging healthy sexual feelings of a child can be subverted into a
- twisted unnatural fetish affecting youth during a vulnerable time in
- their lives."
-
- It is anticipated that parents, when armed with knowledge this
- activity exists and awareness that encounters with such deviate
- individuals results in emotional and psychological damage to their
- child, will take appropriate measures to eliminate the possibility of
- strangers interacting with their children via a computer.
-
- A news conference is scheduled for 10 a.m., Thursday, March 19, 1992
- at Fresno Police Department, Headquarters. The conference, presided
- over by Detective Frank Clark, will be held in the Library located on
- the second floor.
-
- For Further Information: P.I.O. Ron Hults (209) 498-4568
-
- ------------------------------
-
- Date: Tue, Mar 24, '92 22:15:21 PST
- From: John F. McMullen <mcmullen@well.sf.ca.us>
- Subject: File 8-- CFP-2: Sterling Speaks For "The Unspeakable" (NEWSBYTES)
-
- WASHINGTON, D.C., U.S.A., 1992 MAR 25(NB) -- Bruce Sterling, the
- prime luncheon speaker at the 2nd Annual Conference On Computers
- Freedom & Privacy (CFP-2), fulfilled his program billing as "Speaking
- for the Unspeakable" by taking on three separate persona and
- delivering what might have been their messages.
-
- Sterling, best known as a science fiction writer, spoke for three
- characters, a "a malicious hacker", a Latin American police official
- and a Hong Kong businessman, who were, in his words, "too venal,
- violent, treacherous, power-mad, suspicious, or mean-spirited to
- receive (or accept) an invitation to attend."
-
- Sterling began his speech by introducing himself and then saying "When
- the CFP committee asked me if I might recommend someone to speak here
- at CFP-2, I had an immediate candidate. I thought it would be great if
- we could all hear from a guy who's been known as Sergei. Sergei was
- the KGB agent runner for the Chaos Computer Club group who broke into
- Cliff Stoll's computer in the famous Cuckoo's Egg case. Now Sergei is
- described as a stocky bearded Russian espionage professional in his
- mid-40's. He's married, has kids and his hobby is fishing, in more
- senses than one, apparently. Sergei used to operate out of East
- Berlin, and, as far as I personally know, Sergei's operation was the
- world's first and only actual no-kidding, real-life case of
- international computer espionage, So I figured -- why not send Yelsin
- a fax and offer Sergei some hard currency; things are pretty lean over
- at KGB First Directorate these days. CFP could have flown this guy in
- from Moscow on a travel scholarship and I'm sure that a speech from
- Sergei would be far more interesting than anything I'm likely to offer
- here. My proposal wasn't taken up and instead I was asked to speak
- here myself. Too bad! "This struck me as rather a bad precedent for
- CFP which has struggled hard to maintain a broad universality of
- taste. Whereas you're apparently willing to tolerate science fiction
- writers but already certain members of the computer community, KGB
- agents, are being quietly placed beyond the pale. But you know, ladies
- and gentlemen, just because you ignore someone, doesn't mean that
- person ceases to exist -- and you've not converted someone's beliefs
- merely because you won't listen. But instead of Comrade Sergei, here I
- am -- and I am a science fiction writer and, because of that, I
- rejoice in a complete lack of any kind of creditability!
-
- "Today I hope to make the best of that anomalous position. Like other
- kinds of court jesters, science fiction writers are sometimes allowed
- to speak certain kinds of unspeakable truth, if only an apparent
- parody or metaphor. So today, ladies and gentlemen, I will exercise my
- inalienable civil rights as a science fiction writer to speak up on
- behalf of the excluded and the incredible. In fact, I plan to abuse my
- talents as a writer of fiction to actually recreate some of these
- excluded, incredible unspeakable people for you and to have them
- address you today. I want these people, three of them, to each briefly
- address this group just as if they were legitimately invited here and
- just as if they could truly speak their mind right here in public
- without being arrested."
-
- Sterling then went on to assure the crowd that he was not speaking his
- personal conviction, only those of his characters, and warned the
- group that some of the material might be offensive. He then launched
- into the delivery of his characters' speeches -- speeches which had
- the hacker talking about real damage - "the derailing of trains"; the
- Latin police official, a friend and admirer of Noriega, discussing the
- proper way of dealing with hackers; and the businessman explaining
- way, in the age of high speed copiers, laser printers and diskette
- copying devices, the US copyright laws are irrelevant.
-
- Often intercepted by laughter and applause, Sterling received a
- standing ovation at the conclusion of the speech. Computer Press
- Association newsletter editor Barbara McMullen was overhead telling
- Sterling that he had replaced "Alan Kay as her favorite luncheon
- speaker." while conference chair Lance Hoffman, who had received an
- advance copy of the speech a few weeks before, described the speech as
- "incredible and tremendous".
-
- Sterling, relaxing after the talk with a glass of Jack Daniels, told
- Newsbytes that the speech had been fun but a strain, adding "Next time
- they'll really have to get Sergei. I'm going back to fiction."
-
- Sterling's non-fiction work on computer crime, "The Hacker Crackdown"
- is due out from Bantam in the fall and an audio tape of the CFP-2
- speech is available from Audio Archives. He is the author of "Islands
- In The Net" and is the co-author, with William Gibson, of the
- presently best-selling "The Difference Engine".
-
- John F. McMullen/Press Contact: Audio Archives, 818 957-0874/19920325)
-
- ------------------------------
-
- Date: Tue, Mar 24, '92 22:15:34 PST
- From: John F. McMullen <mcmullen@well.sf.ca.us>
- Subject: File 9--CFP-2 Features Role-Playing FBI Scenario (NEWSBYTES REPRINT)
-
- WASHINGTON, D.C., U.S.A., 1992 MAR 25(NB) -- As part of the
- "Birds-of-a-Feather" (BOF) sessions featured at the 2nd Conference on
- Computers, Freedom & Privacy (CFP-2), FBI agent J. Michael Gibbons,
- acting as a live gamemaster, orchestrated the play-acting of an
- investigation by federal agents into allegations of computer intrusion
- and criminal activity. The scenario, set up by Gibbons to show the
- difficulties faced by investigators in balancing the conducting of an
- investigation with a protection of the rights of the individual under
- investigation, was acted out with non-law enforcement officials cast
- in the role of investigators; New York State Police Senior
- Investigator Donald Delaney as "Doctor Doom", the suspected ringleader
- of the computer criminals; Newsbytes New York Bureau Chief John
- McMullen as a magistrate responsible for considering the
- investigators' request for a search warrant; and author Bruce Sterling
- as a neighbor and possible cohort of Doctor Doom.
-
- Gibbons, in His role of Gamemaster, regularly intercepted the action
- to involve the audience in a discussion of what the appropriate next
- step in the scenario would be -- "Do you visit the suspect or get a
- search warrant or visit his school or employer to obtain more
- information?; Do you take books in the search and seizure?, printers?,
- monitors?, etc." During the discussion with the audience, points of
- law were clarified by Mike Godwin, Electronic Frontier Foundation
- in-house counsel, and Alameda County Assistant District Attorney
- Donald Ingraham.
-
- The role-playing session immediately followed a BOF panel, "Hackers:
- Why Don't They Understand" which attempted to present a hacker view of
- on-line ethics. The panel, moderated by McMullen, was composed of
- Steve Levy, MacWorld columnist and author of "Hackers"; Dorothy
- Denning, Chair of Computer Science at Georgetown University; Glenn
- Tenney, California Congressional Candidate and chair of the annual
- "Hacker's Conference"; Craig Neidorf, defendant in a controversial
- case involving the electronic publishing of a stolen document;
- "Dispater", the publisher of the electronic publication "Phrack";
- Emmanuel Goldstein, editor and publisher of "2600: The Hacker
- Quarterly", and hacker "Phiber Optik".
-
- During the panel discussion, Levy, Denning and Tenney discussed the
- roots of the activities that we now refer to as hacking, Goldstein and
- Dispater described what they understood as hacking and asked for an
- end to what they see as overreaction by the law enforcement community,
- Neidorf discussed the case which, although dropped by the government,
- has left him over $50,000 in debt; and Phiber Optik described the
- details of two searches and seizures of his computer equipment and his
- 1991 arrest by Delaney.
-
- In Neidorf's talk, he called attention to the methods used in valuing
- the stolen document that he published as $78,000. He said that it came
- out after the trial that the $78,000 included the full value of the
- laser printer on which it was printed, the cost of the word processing
- system used in its production and the cost of the workstation on which
- it was entered. Neidorf's claims were substantiated by EFF counsel
- Godwin, whose filing of a motion in the Steve Jackson cases caused the
- release of papers including the one referred to by Neidorf. Godwin
- also pointed out that it was the disclosure by interested party John
- Nagle that the document, valued at $78,000, was obtainable in a book
- priced at under $20.00 that led to the dropping of the charges by the
- US Attorney's office.
-
- SRI security consultant Donn Parker, one of the many in the audience
- to participate, admonished Phiber and other hackers to use their
- demonstrated talents constructively and to complete an education that
- will prepare them for employment in the computer industry. Another
- audience member, Charles Conn, described his feeling of exhilaration
- when, as a 12-year old, he "hacked" into a computer at a local
- Kentucky Fried Chicken. Conn said "It was wonderful. It was like a
- drug. I just wanted to explore more and more."
-
- Parker later told Newsbytes that he thought that it was a mistake to
- put hackers such as Phiber Optic and those like Craig Neidorf who
- glorify hackers on a panel. Parker said "Putting them on a panel
- glorifies them to other hackers and makes the problem worse."
-
- The Birds-of-a-Feather sessions were designed to provide an
- opportunity for discussions of topics that were not a part of the
- formal CFP-2 program.
-
- (Barbara E. McMullen/Press Contact: Dianne Martin, The George
- Washington University, 202-994-8238/19920325)
-
- ------------------------------
-
- Date: Thu, 26 Mar 92 18:05:58 -0800
- From: Jim Warren <jwarren@WELL.SF.CA.US>
- Subject: File 10--Electronic CivLib - model candidate's statement & ideas
-
- This concerns practical efforts to assure that traditional
- constitutional rights and protections remain clearly guaranteed, even
- in the context of modern technology -- in the "Information Age" and
- across the "Electronic Frontier."
-
- For this 1992 election-year, the following offers possible models
- for do-it-yourself citizen-based political action. Please "copy, post
- and circulate" this 3-part document wherever and to whomever you wish.
- Please feel free to modify Parts 2 and 3 however you wish -- over your
- own signature. After all, freedom always *has* been a do-it-yourself
- project.
-
- This introduction is PART-1 of three parts.
-
- PART-2 provides a model cover-letter & facts you might use:
- 1. First, it *briefly* mentions the electronic civil liberties issues.
- 2. Its next part is intended to get the attention of a candidate and/or
- their campaign staff by illustrating cheap, effective net communications.
- 3. The next part illustrates that a great number of people (candidate-
- translation: "voters") are involved.
- 4. *Very important*: It outlines our ability to communicate with masses
- of people/voters -- at little or no cost.
- 5. Equally important -- it requests *specific commitment to act* from a
- candidate.
- 6. It offers a matching commitment to publicize their position.
-
- PART-3 is a model candidate's statement committing to specific action.
- Note: All successful politicians have mastered the art of
- *sounding* like they are supportive of the hundreds or thousands of
- causes and pleas that are urged upon them. Good-sounding,
- vaguely-supportive statements are worth virtually nothing. Anything
- less than their issuing a public position statement committing to
- explicit action must be considered as meaningless.
-
- Election season is the one time when we have our best chance at
- efficient and effective citizen action. All it takes is time and effort.
- (And, I walk it like I talk it -- I have forwarded customized versions of
- the cover-letter and model-statement to several state and federal candidates
- -- all of whom are seeking re-election or election to higher office.)
- I would be happy to help others working on these issues, time permitting.
-
- The more people who send this cover letter and model statement to
- candidates -- and phone campaign headquarters and ask questions at
- candidates' forums; the more sensitized they will become to this
- constituency and these fundamental issues of a free society.
- Speak and write, now; speak and write, often.
- "The price of freedom ..."
-
- --Jim Warren, Electronic Civil Liberties Initiative,
- 345 Swett Road, Woodside CA 94062; fax/415-851-2814
- email/ jwarren@well.sf.ca.us
- [ For identification purposes only: organizer/chair of First Conference on
- Computers, Freedom & Privacy (1991), first-year recipient of Electronic
- Frontier Foundation Pioneer Award (1992), MicroTimes contributing editor &
- columnist, Autodesk Board of Directors member, founding of InfoWorld,
- founding editor of Dr. Dobb's Journal, past chair of ACM, SIGMICRO and
- SIGPLAN chapters, etc., blah blah blah. ]
-
- =============== PART-2, MODEL COVER-LETTER TO CANDIDATE(S) ================
-
- Dear [candidate],
-
- A growing percentage of the 12-16 million people who are "online" --
- using networked computers -- are expressing increasing concern about
- protecting traditional civil liberties and personal privacy in the
- "Information Age." (People are "coming online" at a rate much faster than
- the explosive growth of personal computing since they began in the mid-'70s.)
-
- As we use networked computers for electronic-mail, teleconferencing
- and information exchange, they are reporting rapidly-increasing threats to
- electronic "speech," "press," "assembly," personal security and privacy.
-
- For instance: In 1990, a single notice sent out across computer
- nets prompted 30,000 complaints about Lotus Corporation's plans to
- sell personal data on 20-million consumers. Lotus quickly withdrew
- their "Marketplace" product before sales ever began.
-
- Or: In Spring, 1991, a single message sent into the computer nets
- prompted thousands of complaints to Senators Biden and DeConcini. It
- concerned legislation they had introduced, reportedly requested by the
- FBI via Senator Thurmond, that would have crippled secure voice and
- data communications for U.S. citizens and business. The Senators
- withdrew the proposal with three weeks of the net-circulated note.
-
- How many voters are involved?
-
- Almost all users are adults. Most are well-educated. Most have
- upscale incomes. Most have significant discretion for spending and
- contributions.
-
- Recent published research indicates there are about 14.2-million
- people sharing 1.3-million "host" computers on the "Internet." This
- includes about 960,000 people using more than 12,000 home/personal
- computers as shared BBSs -- networked electronic "bulletin board
- systems." These offer free or almost-free teleconferencing and
- electronic-mail. [Matrix News, Feb., 1992, 1120 S. Capitol-of-Texas
- Hwy., Bldg. 2-300, Austin, TX 78746.]
-
- (In addition, there are also the commercial systems such as
- CompuServe, Prodigy, GEnie and MCImail -- but they have only several
- million users and are very costly in comparison to the much larger
-
- Internet computer matrix.) Mass-discussions of freedom and privacy
- concerns are escalating.
-
- Almost-instant mass-circulated online "newspapers" and "news-groups"
- plus numerous popular teleconferences increasingly carry reports of
- electronic civil-liberties and privacy concerns. Credit-data abuses,
- covert employer surveillance, corporate espionage, seizure of
- electronic publications, searches of entire electronic post offices,
- and government opposition to secure communications are greatly
- escalating these concerns.
-
- These issues are rapidly penetrating the public press and
- television. Example: The First Conference on Computers, Freedom and
- Privacy (1991), prompted well in excess of 80 pages of press,
- including the New York Times, Los Angeles Times, Wall Street Journal
- Time Magazine, Business Week, Scientific American, Germany's Der
- Spiegel, etc.. [For copies, contact CFP#1 chair, Jim Warren, 345
- Swett Road, Woodside CA 94062; 415-851-7075.]
-
- Functionally-free, almost-instantaneous mass communication is
- available.
-
- It is trivial for anyone to "broadcast" comments or information
- across the nets to thousands of people, almost immediately and for
- free or perhaps costing $15-$20/month. Over a million people read
- news-groups in USENET, which is just one of thousands of electronic
- "newspapers."
-
- And, system-owners and system-operators -- those often most-deeply
- concerned about these civil liberties, privacy and content-liability issues
- -- can have every user of their system receive whatever message they choose,
- perhaps only once, or perhaps every time each person logs-in. Without cost.
- Various of these "sysops" are agreeing to inform every one of their users --
- often numbering in the thousands -- about candidates who commit to act to
- protect civil liberties and privacy against new, technology-based threats.
-
- We ask for your commitment.
-
- A number of people who are well-known across this huge network are
- asking candidates to commit to specific action, to make clear that
- constitutional protections unquestionably apply across this new
- "electronic frontier." We ask that you issue a formal position
- statement, committing to act on these matters. (We recognize that an
- informal statement of general principles is of minimal value without
- specifics or commitment to action.)
-
- We ask that you commit to protecting Constitutional freedoms,
- regardless of technology. Enclosed is a "model" that you might use as
- a starting point. (It illustrates some of the issues that many people
- feel are most important.)
-
- Commitment is reciprocal. If you commit to act, we will promptly
- broadcast it far and wide across this massive, high-speed network.
- And, if your opponent(s) avoid explicit commitment -- by specific
- refusal or simply by inaction -- we will publicize that with equal
- vigor.
-
- Additionally, some of us are prepared to assist committed
- candidates to publicize/discuss all of their positions and issues (not
- just these online issues) via this free, fast, pervasive mass-medium.
-
- And finally, candidates who address these issues first can
- generate notice in the public press and television -- especially re
- protecting freedom of speech, press, assembly and personal privacy.
- Numerous reporters have covered these issues, to say nothing of the
- 300-400 computer trade periodicals. Some of us have lists of lay and
- trade reporters interested in these issues and would be happy to
- assist in publicizing your commitment.
-
- I appreciate your attention to these comments and requests, and look
- forward to your timely reply.
-
- <<signature & affiliation, if any>>
-
- =================== PART-3, MODEL CANDIDATE'S STATEMENT ====================
-
- Guaranteeing Constitutional Freedoms into the 21st Century
-
- Preface
-
- Harvard Law Professor Laurence H. Tribe, one of the nation's
- leading Constitutional scholars, views technological threats to our
- traditional constitutional freedoms and protections as so serious that --
- for the first time in his career -- he has proposed a Constitutional
- Amendment:
-
- "This Constitution's protections for the freedoms of speech, press,
- petition and assembly, and its protections against unreasonable searches and
- seizures and the deprivation of life, liberty or property without due
- process of law, should be construed as fully applicable without regard to
- the technological method or medium through which information content is
- generated, stored, altered, transmitted or controlled."
-
- -- First Conf. on Computers, Freedom & Privacy, 3/27/91, Burlingame CA
-
- In the absence of such a constitutional clarification, legislation
- and regulation are the only alternatives to assure that citizens are
- protected from technological threats against their constitutional
- rights and freedoms.
-
- Candidate's Commitment to Action
- (model statement)
-
- Preface: It has been over two centuries since our Constitution and Bill
- of Rights were adopted. The great technological changes in the interim --
- especially in computing, telecommunications and electronics -- now pose a
- clear and present danger to the rights and protections guaranteed in those
- great documents. Therefore:
-
- Commitment: In the first legislative session after I am
- [re]elected, I will author or co-author legislation reflecting the
- following specifics, and I will actively support and testify in favor
- of any similar legislation as may be introduced by others. Further, I
- will actively seek to include in such legislation, explicit personal
- civil and/or criminal penalties against any agent, employee or
- official of the government who violates any of these statutes. And
- finally, I will keep all citizens who express interest in legislative
- progress on these matters fully and timely informed.
-
- The protections guaranteed in the Constitution and its Amendments
- shall be fully applicable regardless of the current technology of the
- time. This particularly includes, but is not limited to:
-
- Speech: Freedom of speech shall be equally protected, whether by
- voice or in written form as in the 18th Century, or by electronic
- transmission or computer communication as in the 20th Century and
- thereafter.
-
- Press: Freedom of the press shall be equally protected, whether
- its information is distributed by print as in the 18th Century, or by
- networked computers or other electronic forms, as in the 20th Century
- and thereafter. Liability for content: Just as a printer is not
- liable for content of leaflets printed for a customer, so also shall
- the owner or operator of a computer or electronic or
- telecommunications facility be held harmless for the content of
- information distributed by users of that facility, except as
- the owner or operator may, by contract, control information content.
- Those who author statements and those who have contractual authority
- to control content shall be the parties singularly responsible for
- such content.
-
- Assembly: Freedom of assembly shall be equally protected, whether
- by face-to-face meeting as in the 18th Century, or by computer-based
- electronic-conference or other teleconference as in the 20th Century
- and thereafter. The right to hold confidential meetings shall be
- equally protected, whether they be by personal meeting in private
- chambers, or by computer-assisted or electronic-based means.
-
- Self-defense: The right of the people to keep and use computers
- and communications connections shall not be abridged by the
- government.
-
- Search & seizure: The right of the people to be secure in their
- papers and effects, against unreasonable searches and seizures, shall
- be fully applicable to their electronic mail, computerized information
- and personal computer systems.
-
- Warrants: No warrants for search or seizure shall issue for
- computerized information, but upon probable cause, supported by oath
- or affirmation, and particularly describing the computer system to be
- searched and the specific information to be seized.
-
- Secure information vaults: Just as search and seizure of letters in a
- post-office, and papers in a bank-vault lock-box, and surveillance of
- telephone conversations by wire-tap, each require a separate warrant
- for each postal address, lock-box and telephone line, so also shall a
- separate warrant be required for each electronic-mail address and/or
- computer files of each suspect, when stored in a computer facility or
- archive shared by others. And further, computer files stored in a
- shared facility or archive by or for a citizen who is neither named in
- a warrant nor associated with a suspect so-named, may not be used
- against that un-named citizen, if seized or discovered during legal
- search of or for files of a suspect.
-
- Self-incrimination: No person shall be compelled in any civil or
- criminal case to be a witness against himself or herself, nor be
- compelled to provide information retained only in their mind, nor
- otherwise be compelled to assist the translation or decoding of
- information that he or she believes may be self-incriminating.
-
- Property: Private property shall not be taken for public use
- without just compensation, nor shall such property be used nor sold by
- any government agency for less than fair market value, in which case
- all such proceeds shall promptly derive singularly to its last owner
- prior to government seizure.
-
- Speedy release: Anyone not accused of a crime shall enjoy the
- right to a speedy release and return of all of their property, as may
- be seized under any warrant, particularly including their computerized
- information. The government shall be fully liable for any damage
- befalling property or information they have seized.
-
-
- [signed] _______________________ ______________ [date] _________________
- _________________________ [please print or type]
- _________________________ title / current office / office sought
- _________________________ address
- _________________________
- _________________________
- _________________________ campaign-office voice-phone number
- _________________________ campaign-office fax number
- _________________________ campaign-office electronic-mail address
-
- [ Additional copies of this model candidate's position commitment are
- available from: Jim Warren, Electronic Civil Liberties Initiative,
- 345 Swett Road, Woodside CA 94062; (415)851-7075, fax/(415)851-2814;
- electronic-mail/ jwarren@autodesk.com -or-
- jwarren@well.sf.ca.us . 3/26/92
- For identification purposes, only, Warren was the Chair of the First
- Conference on Computers, Freedom & Privacy held in March, 1991, is a
- Contributing Editor for MicroTimes and is a member of the Board of Directors
- of Autodesk, one of the nation's half-dozen largest software companies.]
-
- ------------------------------
-
- End of Computer Underground Digest #4.15
- ************************************
-