home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Wed Dec 14, 1994 Volume 6 : Issue 105
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Retiring Shadow Archivist: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Copy Reader: Laslo Toth
-
- CONTENTS, #6.105 (Wed, Dec 14, 1994)
-
- File 1--A Hoax In Time (CyberWire Dispatch)
- File 2--UNABOM - $1,000,000.00 Reward - Series of 14 Unsolved Bombings
- File 3--DigitaLiberty
- File 4--Preliminary Info on the Pensacola BBS Busts
- File 5--Cu Digest Header Info (unchanged since 25 Nov 1994)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ----------------------------------------------------------------------
-
- Date: Fri, 9 Dec 1994 14:56:36 -0800
- From: "Brock N. Meeks" <brock@well.sf.ca.us>
- Subject: File 1--A Hoax In Time (CyberWire Dispatch)
-
- CyberWire Dispatch // Copyright (c) 1994 //
-
- Jacking in from the "Back From the Dead" Port:
-
- Washington, DC -- Nothing chills -- or inflames -- the Net faster than
- when word of the dreaded "FCC Modem Tax" begins ooze through
- Cyberspace.
-
- Well... it's back. Sort of.
-
- Ruth Milkman, legal advisor to Federal Communications Commission
- Chairman Reed Hundt, said during a recent question and answer session
- that the agency might again take up the issue of the so-called modem
- tax.
-
- "Some years down the road I can see acceess fees [for enhanced service
- providers] being considered by the FCC," Milkman said during a phone
- interview. "But only under the scenario when access charges are
- reformed."
-
- These access charges are a kind of trip wire phrase which online
- activists have dubbed a "modem tax" when applied to enhanced service
- providers, which is another catch phrase meaning services like America
- Online and CompuServe.
-
- Milkman said the FCC would only consider an access charge under a very
- narrow scenario which would play out only if "enhanced service
- providers felt that by paying the access charges they weren't
- contributing to a subsidy scheme set up for (long distance phone
- companies)," Milkman said.
-
- So, what the hell is an "access charge"? Take a deep breath. Here
- goes:
-
- Access charges are paid by long distance companies to local telephone
- companies. Every time a company such as AT&T connects a caller in Des
- Moines with Uncle Bert in New York, it has to pay Nynex, the local
- telephone company, a fee for the privilege of carrying that long
- distance call over their facilities, commonly known as the "local
- loop."
-
- Long distance companies pay up to 40% of their entire revenues to
- local telephone companies. That's billions and billions of dollars
- each year that flow into the hands of the Baby Bells, just for
- completing the calls.
-
- The access fees are set at artificially high rates because they
- contain a mind numbing set of complex subsidies, the most obvious one
- is that which underwrites the public policy known as "Universal
- Service."
-
- Back in the days when the FCC only had rotary dial phones (circa 1987)
- someone came up with the brilliant idea that because modem use was
- increasing at such a rapid pace, that maybe services such as
- Sprintlink (then known as telenet) and CompuServe should have to pay
- these access charges, too.
-
- After all, the FCC wonks postured, they carry long distance (modem)
- traffic over the phone lines? It would only be fair to have these
- "enhanced service providers" as they are known in FCC-speak, also help
- out the impoverished long distance phone companies underwrite
- Universal Service.
-
- Bingo. The hue and cry that went up from the online community (it
- wasn't yet called "the Net") was enormous. The major players --
- Telenet and CompuServe -- quickly branded the plan as a "tax" and thus
- the phrase "modem tax" was born.
-
- Dire warnings went out: If the FCC succeeded in making enhanced
- service providers chip in for access fees, it would increase the cost
- of each hour of online time by at least $6 per hour.
-
- And remember, this was in the days when a 2,400-bps modem was the
- hottest thing going. Six bucks an hour would have demolished the
- struggling online industry.
-
- The fallout among the nascent online community was astounding. For the
- first time in history, the "net" community rose up with a single voice
- and FLOODED the FCC with protests.
-
- FCC official "filing kits" made the rounds, teaching people how to
- file official comments of protest.
-
- The ground swell of opposition worked. The FCC was buried in
- responses. At the time, the FCC said it was the hottest item in its
- history, garnering more response than any issue in history.
-
- The FCC eventually backed off. The reason: It was persuaded that
- enhanced service providers were still entrepreneurial companies and
- couldn't afford the burden of access fees.
-
- The proposal was officially dropped. It was the first major victory
- for the Net. And it was empowering. The online community became
- educated and enlightened almost over night to the ways of an arcane
- governmental agency. And this community was drunk with a heady kind
- of power: It could sufficiently affect the outcome of governmental
- regulation.
-
- Small catch: The damn "modem tax" issue wouldn't die.
-
- Someone with the brains of a trout began to circulate the now infamous
- "modem tax" file. The file claims that Jim Eason, a San Franciso
- radio talk show host had aired a segment in which he claimed to have
- inside information that the FCC was about to relaunch its "modem tax"
- proposal.
-
- The message was and is a HOAX.
-
- But it also has never died. It's the Net's first "urban myth" and
- like Freddie, it refuses to die, even to this day.
-
- Milkman, who was on-board at the FCC during the 1987 modem tax
- firefight, sighed when explaining the complex issue: "Part of the
- problem is that nobody is exactly sure what all the subsidies are.
- Most people agree that there are subsidies in the access charges, but
- you can't break out those subsidies exactly."
-
- Another factor in play: Sometimes enhanced service providers are
- really just reselling long distance transport after having bought
- large blocks of time from a major carrier like AT&T. Thus, to have
- these enhanced service providers also pay an access fee amounts to a
- kind of double-dipping, Milkman said.
-
- As it turns out, Congress might have as much to say about a future
- "modem tax" as the FCC. This twisted scenario turns on the tenuous
- grasp that everyone from the Vice President to Commerce Department to
- the FCC has on exactly what constitutes "Universal Service," in the
- era of the Information Superhighway.
-
- Revamping the 60 year old Communications Act of 1934 will be up to
- Congress this year. And they will likely do it. But how universal
- service is defined remains a big mystery. And who ends up paying for
- and maintaining that public policy (which isn't about to be abolished)
- also remains a mystery.
-
- Don't be surprised if, when the legislative smoke clears, not only do
- enhanced service providers -- America Online, CompuServe and Prodigy,
- et al -- have to pay access fees, but also your Internet provider and
- your cable company.
-
- And who do you think will end up catching those cost increases??
- Right. Your wallet.
-
- But for now? Rest easy, Milkman says: "I want to make this very
- clear: There is NO docket [open] in which the Commission is proposing
- making enhanced service providers pay access charges. And I don't
- anticipate it coming up."
-
- Meeks out...
-
- ------------------------------
-
- Date: Wed, 14 Dec 1994 22:40:00 -0600
- From: Sociology Department Gopher Manager <tk0gphr@CORN.CSO.NIU.EDU>
- Subject: File 2--UNABOM - $1,000,000.00 Reward - Series of 14 Unsolved Bombings
-
- F.B.I. GOPHER Information Server
-
- Dear Netters:
-
- The information presented on the Internet about the UNABOM
- investigation has been made available publicly before. Recent
- electronic media presentations include: CBS's "Eye to Eye" with Connie
- Chung (12/16/93), and Fox's "America's Most Wanted" (11/23/93). Print
- media stories about the UNABOM investigation have also appeared:
- Washington Post (11/27/93), New York Times (10/7/93), etc.
-
- The purpose for submitting the information on the Internet is
- two-fold. First, the Internet is another medium that enables us to
- reach as wide an audience as possible; to "spread the word." Second,
- Internet users are precisely the type ofindividuals that to date have
- been recipients of explosive devices attributed toUNABOM; scholars
- and researchers.
-
- You are not being asked to place yourself in harm's way. You are
- encouraged to come forward if you have information that might help
- identify, arrest, and convict the person(s) responsible for these
- bombings. Contact the UNABOM Task Force at 1-800-701-2662.
-
- This information has been made available on the Internet in three
- ways:
-
- Anonymous FTP: ftp://naic.nasa.gov/
-
- Gopher: gopher://naic.nasa.gov/11/government-resources/fbi
-
- World Wide Web: http://naic.nasa.gov/fbi
-
- Thank you, William L. Tafoya, Ph.D.
- Special Agent, FBI
- UNABOM Task Force
- San Francisco, CA
-
- btafoya@orion.arc.nasa.gov
-
- 1-800-701-2662
- FAX: 415-553-7590
- 415-553-7400
-
- =================================================
-
- UNABOM
- $1,000,000 Reward
- SERIES OF 14 UNSOLVED BOMBINGS
-
-
- Beginning in May, 1978, a series of 14 bombing incidents have
- occurred across the United States for which there is no apparent
- explanation or motive. No person or group has been identified as
- the perpetrator(s) of these incidents. The explosions have taken
- place in seven states from Connecticut to California. As a result
- of these bombings, one person has been killed and 23 others
- injured, some grievously. There had been no incidents identified
- with this series of bombings since 1987. However that changed in
- late June, 1993, when a well known geneticist residing in Tiburon,
- California, and a renown computer scientist from Yale University,
- New Haven, Connecticut, opened packages which had been mailed to
- them and both were severely injured when these packages exploded.
-
- In the past, targets of the bomber have been associated with
- the computer industry, the aircraft and airline industry and
- universities. Seven of these devices have been mailed to specific
- individuals and the other seven have been placed in locations
- which suggest there was no specific intended victim. All but two
- of the explosive devices functioned as designed and exploded. All
- 14 crimes, dubbed "UNABOM", have had common effects: all have
- caused terror, grief, and fear. On September 11, 1985, Hugh
- Scrutton, the owner of the Rentech Computer Company, in
- Sacramento, California, was killed by one of these diabolic
- devices. The two most recent victims narrowly escaped death.
-
- In response to the June, 1993, events, the Attorney General
- directed that a task force of federal law enforcement agencies be
- reestablished to urgently investigate and solve these crimes. The
- UNABOM Task Force, consisting of investigators from the FBI, ATF,
- and the U.S. Postal Inspection Service, has been operational in
- San Francisco and Sacramento, California, since July 12, 1993, and
- is dedicated exclusively to the investigation of these crimes.
-
- Among the clues in the case are the following words in what
- appears to be a note possibly written by the bomber as a reminder
- to make a telephone call: "call Nathan R--Wed 7PM." The UNABOM
- Task Force believes that "Nathan R" may be associated, perhaps
- innocently, with the bomber and that "Nathan R" may have received
- a telephone call from the bomber on a Wednesday prior to the June,
- 1993 bombings.
-
- The two most recent tragic bombings illustrate the senseless
- and tragic consequences of these crimes and demonstrate the urgent
- necessity of solving this case. This serial bomber will strike
- again. We do not know who the next victim will be. We do believe
- that there is someone out there who can provide the identity of
- the person or persons responsible for these crimes. This person
- may be a friend, a neighbor, or even a relative of the bomber(s).
-
- UNABOM's chronology is as follows:
-
- 1) Northwestern University
- Evanston, Illinois
- May 25, 1978
-
- A package was found in the Engineering Department parking lot
- at the Chicago Circle Campus of the University of Illinois. The
- package was addressed to an Engineering Professor at Rensselaer
- Polytechnic Institute in Troy, New York. The package had a return
- address of a Professor at Northwestern's Technological Institute.
- The package was returned to the addressor who turned it over to
- the Northwestern University Police Department because he had not
- sent the package. On May 26, 1978 the parcel was opened by a
- police officer who suffered minor injuries when the bomb
- detonated.
-
- 2) Northwestern University
- Evanston, Illinois
- May 9, 1979
-
- A disguised explosive device which had been left in a common
- area in the University's Technological Institute, slightly injured
- a graduate student on May 9, 1979, when he attempted to open the
- box and it exploded.
-
- 3) Chicago, Illinois
- November 15, 1979
-
- An explosive device disguised as a parcel was mailed from
- Chicago for delivery to an unknown location. The bomb detonated
- in the cargo compartment of an airplane, forcing it to make an
- emergency landing at Dulles Airport. Twelve individuals were
- treated for smoke inhalation. The explosion destroyed the
- wrapping to such an extent that the addressee could not be
- determined.
-
- 4) Chicago, Illinois
- June 10, 1980
-
- A bomb disguised as a parcel postmarked June 8, 1980 was
- mailed to an airline executive at his home in Lake Forest,
- Illinois. The airline executive was injured in the explosion.
-
- 5) University of Utah
- Salt Lake City, Utah
- October 8, 1981
-
- An explosive device was found in the hall of a classroom
- building and rendered safe by bomb squad personnel.
-
- 6) Vanderbilt University
- Nashville, Tennessee
- May 5, 1982
-
- A wooden box containing a pipe bomb detonated on May 5, 1982,
- when opened by a secretary in the Computer Science Department.
- The secretary suffered minor injuries. The package was initially
- mailed from Provo, Utah on April 23, 1982, to Pennsylvania State
- University and then forwarded to Vanderbilt.
-
- 7) University of California
- Berkeley, California
- July 2, 1982
-
- A small metal pipe bomb was placed in a coffee break room of
- Cory Hall at the University's Berkeley Campus. A Professor of
- Electrical Engineering and Computer Science was injured when he
- picked up the device.
-
- 8) Auburn, Washington
- May 8, 1985
-
- A parcel bomb was mailed on May 8, 1985, to the Boeing
- Company, Fabrication Division. On June 13, 1985, the explosive
- device was discovered when employees opened it. The device was
- rendered safe by bomb squad personnel without injury.
-
- 9) University of California
- Berkeley, California
- May 15, 1985
-
- A bomb detonated in a computer room at Cory Hall on the
- Berkeley Campus. A graduate student in Electrical Engineering
- lost partial vision in his left eye and four fingers from his
- right hand. The device was believed to have been placed in the
- room several days prior to detonation.
-
- 10) Ann Arbor, Michigan
- November 15, 1985
-
- A textbook size package was mailed to the home of a
- University of Michigan Professor in Ann Arbor, Michigan from Salt
- Lake City. On November 15, 1985, a Research Assistant suffered
- injuries when he opened the package. The Professor was a few feet
- away but was not injured.
-
-
- 11) Sacramento, California
- December 11, 1985
-
- Mr. Hugh Scrutton was killed outside his computer rental
- store when he picked up a device disguised as a road hazard left
- near the rear entrance to the building. Metal shrapnel from the
- blast ripped through Scrutton's chest and penetrated his heart.
-
- 12) Salt Lake City, Utah
- February 20, 1987
-
- On February 20, 1987, an explosive device disguised as a road
- hazard was left at the rear entrance to CAAMs, Inc. (computer
- store). The bomb exploded and injured the owner when he attempted
- to pick up the device.
-
- 13) Tiburon, California
- June 22, 1993
-
- On June 22, 1993, a well known geneticist received a parcel
- postmarked June 18, 1993, at his residence. The doctor attempted
- to open the package at which time it exploded severely injuring
- him. It has been determined that this parcel was mailed from
- Sacramento, California.
-
- 14) Yale University
- New Haven, Connecticut
- June 24, 1993
-
- On June 24, 1993, a Professor/Computer Scientist at Yale
- University attempted to open a parcel which he had received at his
- office. This parcel exploded severely injuring him. It has been
- determined that this parcel was mailed from Sacramento, California
- on June 18, 1993.
-
- At this time, the UNABOM Task Force would appeal to the
- public for assistance. For this purpose, a one million dollar
- reward is being offered for information which results in the
- identification, arrest and conviction of the person(s)
- responsible. Contact the UNABOM Task Force at 1-(800) 701-
- 2662.
-
-
-
- William L. Tafoya, Ph.D.
- Special Agent, FBI
- UNABOM Task Force
- San Francisco, CA
- btafoya@orion.arc.nasa.gov
-
-
- ------------------------------
-
- Date: Tue, 6 Dec 1994 18:38:13 -0800
- From: email list server <listserv@SUNNYSIDE.COM>
- Subject: File 3--DigitaLiberty
-
- Friends of Liberty,
-
- It is becoming increasingly apparent that the arrival of cyberspace is
- destined to engender a fundamental discontinuity in the course of human
- relations. This is a source of great optimism and opportunity for those of
- us who believe in freedom.
-
- Many of you who participate in the lively debates that take place in these
- forums have seen a number of activist organizations spring up claiming to
- represent the cause of freedom. And if you are like me you have cheered
- these groups on only to watch them get bogged down in a quagmire of
- realpolitics.
-
- It is a sad fact that the beast in Washington has evolved into a
- self-perpetuating engine expert at co-opting the principles of even the most
- ardent reformers. Slowly but surely all those who engage the system are
- ultimately absorbed into the mainstream miasma of majoritarianism. For
- example, what can be more discouraging than watching an organization that
- started out as a cyber-civil liberties group shift its focus to creating new
- forms of government entitlements while endorsing intrusive wiretap
- legislation because they didn't want to jeopardize their influence and
- prestige amongst the Washington power elite?
-
- Some of us believe we can seek ultimate redress at the polls. Many pundits
- have declared our recent national elections a watershed in politics, a
- turning point that represents the high water mark of big government.
- Nonsense. The names have changed, the chairs have been rearranged, but the
- game remains the same. The so-called "choices" we are presented with are
- false, hardly better than the mock one-party elections held by failed
- totalitarian regimes. There must be a better way.
-
- I would like to announce the formation of a new group - DigitaLiberty - that
- has chosen a different path. We intend to bypass the existing political
- process. We reject consensus building based on the calculus of compromise.
- Instead we plan to leave the past behind, much as our pioneering
- forefathers did when they set out to settle new lands. It is our mission
- to create the basis for a different kind of society. If you would like to
- join us I invite you to read the information below.
-
- Yours in freedom,
-
- Bill Frezza
- Co-founder, DigitaLiberty
- December 6, 1994
-
- --------------------------------------------------------------------------
-
- *** What is DigitaLiberty?
-
- DigitaLiberty is an advocacy group dedicated to the principled defense of
- freedom in cyberspace. We intend to conduct this defense not by engaging in
- traditional power politics but by setting an active, persuasive example -
- creating tangible opportunities for others to join us as we construct new
- global communities.
-
- We believe deeply in free markets and free minds and are convinced that we
- can construct a domain in which the uncoerced choices of individuals supplant
- the social compact politics of the tyranny of the majority.
-
- *** Is DigitaLiberty a political party or a lobbying group?
-
- Neither.
-
- DigitaLiberty does not seek to educate or influence politicians in the hope
- of obtaining legislation favorable to our constituents. We plan to make
- politicians and legislators irrelevant to the future of network based
- commerce, education, leisure, and social intercourse.
-
- DigitaLiberty does not seek to persuade a majority of the electorate to adopt
- views which can then be forced upon the minority. We hope to make
- majoritarianism irrelevant. We invite only like minded individuals to help
- us build the future according to our uncompromised shared values.
-
- *** What do you hope to accomplish?
-
- DigitaLiberty is not hopeful that widespread freedom will come to the
- physical world, at least not in our lifetime. Too many constituencies depend
- upon the largess and redistributive power of national governments and
- therefore oppose freedom and the individual responsibility it entails. But
- we do believe that liberty can and will prevail in the virtual domains we are
- building on the net and that national governments will be powerless to stop
- us. We believe that cyberspace will transcend national borders, national
- cultures, and national economies. We believe that no one will hold
- sovereignty over this new realm because coercive force is impotent in
- cyberspace.
-
- In keeping with the self-organizing nature of on-line societies we believe
- we will chose to invent new institutions to serve our varied economic and
- social purposes. DigitaLiberty intends to be in the forefront of the
- discovery and construction of these institutions.
-
- *** But what about the construction of the "Information Superhighway"?
-
- The fabric of cyberspace is rapidly being built by all manner of entities
- espousing the full range of political and economic philosophies. While
- political activity can certainly accelerate or retard the growth of the net
- in various places and times it cannot stop it nor can it effectively control
- how the net will be used.
-
- Our focus is not on the institutions that can and will impact the building
- of the physical "information highway" but on those that will shape life on
- the net as an ever increasing portion of our productive activities move
- there.
-
- *** What makes you think cyberspace will be so different?
-
- The United States of America was the only country in history ever to be built
- upon an idea. Unfortunately, this idea was lost as we slowly traded away our
- liberties in exchange for the false promise of security.
-
- DigitaLiberty believes that technology can set us free. The economies of the
- developed world are now making a major transition from an industrial base to
- an information base. As they do, the science of cryptology will finally and
- forever guarantee the unbreachable right of privacy, protecting individuals,
- groups, and corporations from the prying eyes and grasping hands of
- sovereigns. We will all be free to conduct our lives, and most importantly
- our economic relations, as we each see fit.
-
- Cyberspace is also infinitely extensible. There will be no brutal
- competition for lebensraum. Multiple virtual communities can exist side by
- side and without destructive conflict, each organized according to the
- principles of their members. We seek only to build one such community, a
- community based on individual liberty. Others are free to build communities
- based on other principles, even diametrically opposed principles. But they
- must do so without our coerced assistance.
-
- Effective communities will thrive and grow. Dysfunctional communities will
- wither and die. And for the first time in human history, rapacious societies
- will no longer have the power to make war on their neighbors nor can bankrupt
- communities take their neighbors down with them.
-
- *** What does this have to do with my real life? I can't eat data. I don't
- live in a computer.
-
- Yes, but imagine the ultimate impact of mankind's transition from an
- agrarian economy to an industrial economy to an information economy. Our
- founding fathers would have consider anyone insane who predicted that a
- nation of 250 million could feed itself with fewer than 3% of its citizens
- involved in agriculture. Similarly, economist and politicians trapped in
- the policies of the past lament our move from a manufacturing economy to a
- knowledge worker and service based economy. We see this as a cause to
- rejoice.
-
- The day will come when fewer than 5% of the citizens of a nation of 1 billion
- will be involved in manufacturing - if we still bother calling geographically
- defined entities "nations". What will the rest of us be doing? We will be
- providing each other with an exploding array of services and we will be
- creating, consuming, and exchanging information. Most of this will occur
- entirely within or be mediated at least in part by our activities in
- cyberspace.
-
- Many of us will earn a very good living on the net. Our race, our religion,
- our gender, our age, our physical appearance and limitations will all be
- irrelevant and undetectable. Hard working individuals from underdeveloped
- nations who in the past might have been forced to emigrate in search of
- economic freedom and opportunity can now build productive lives in
- cyberspace. And much if not all of the wealth we create that we do not
- transform into visible physical assets will be ours to keep and use, beyond
- the grasp of sovereigns.
-
- *** What is the purpose of this forum?
-
- The DigitaLiberty Forum is a place where like minded individuals can share
- their views, observations, and strategies related to the development of
- virtual communities based on freedom. It is a place where people can
- exchange information and advice about how they have developed
- extra-territorial business and social relationships - away from the
- influence and outside the jurisdiction of governments. It is a forum for the
- posting of essays, questions, and ideas on the topic of liberty. It is a
- place where we can meet and debate the forms that our new institutions might
- take and discuss the practical problems and responsibilities that freedom
- entail.
-
- In time as our technology matures some of us will move on to more ambitious
- projects, launch other programs, and begin our virtual migration from the
- swamp of coerced collectivism. Best of all, there will be no need to
- physically move to 'Galt's Gulch' or escape to a floating 'Freedonia'. We
- can all participate in this exodus without hastily quitting our jobs or
- disrupting our lives. And as a larger and larger portion of our economic and
- social activities move onto the net we will create a new society, open to all
- with the will to enter. This new world will be interleaved with the physical
- world in which we now live and yet will be separate. And free.
-
- Join us as we begin the journey.
-
- *** Who can join DigitaLiberty?
-
- The DigitaLiberty Forum is open to anyone that can honestly answer yes to the
- following two questions:
-
- 1) I renounce the use of coercive force as a tool of social or economic
- policy.
-
- 2) I do not derive the majority of my income from funds taken from
- taxpayers.
-
- *** How do I join DigitaLiberty?
-
- If you qualify, send a message to DigitaLiberty-request@phantom.com with the
- words "SUBSCRIBE" in the subject line and the message body as follows
-
- SUBSCRIBE DigitaLiberty <your name>
-
- And welcome to the future.
-
- ------------------------------
-
- Date: Wed, 14 Dec 1994 22:40:00 CST
- From: Various <tk0jut2@mvs.cso.niu.edu>
- Subject: File 4--Preliminary Info on the Pensacola BBS Busts
-
- ((MODERATORS' NOTE: There have been rumors flying fast and furious
- about some "busts" in Pensacola, Florida, in the first week of
- December. One net post indicated that as many as 10 BBSes were raided,
- but there seemed to be few details on the incident(s). It seems that
- there were only two or three boards raided, but it's still not clear.
-
- CuD called around the Florida area in an attempt to obtain some
- information, but without much success. The Pensacola police indicated
- that they were not involved. An FBI spokesperson indicated that the
- FBI was not involved, and that we should call the Florida Department
- of Law Enforcement, a state law enforcement agency. We did, and talked
- to Larry Smith (904-444-8570) who could not provide many details,
- because it was an "ongoing investigation." He did tell us, however,
- that the description of the raids as posted on the Net was inaccurate.
- He confirmed that the FBI was not involved, and told us that "several"
- warrants had been served by his department and the U.S. Secret
- Service. He was unwilling to specify the alleged charges, but
- according to some observers (and suggested by the article below),
- pornography may have been an issue. Whether it was the original motive
- of the raids remains unclear. If it is true that this was a USSS case,
- it would raise the question of why the USSS is involved in a
- "pornography" raid.
-
- The facts remain murky, but the case is not invisible. The following
- (fwd) suggests that the mainstream media may also be concerned about
- some of the unanswered questions.))
-
- ==============================
-
- (Originally posted by mrjackson@delphi.com)
-
- High-tech crimes lack high-tech law
- (Source: Pensacola News, Dec 10, 1994)
-
- When state and Federal agents pulled the plug--literally--on two
- Pensacola electronic bulletin boards, some serious questions were
- raised: What laws were broken, and what about protection against
- unfair search and seizure?
-
- Remember, property was taken, but no charges placed.
-
- Officers involved with the shutdowns--of Titan Software Solutions
- and Electric Blue--say they believed pornography was being transmitted
- over the bulletin boards. Board operators, or Sysops (system
- operators), say their boards do provide some nude photos, "Swimsuits,
- lingerie, a little T-and-A," but that's all.
-
- If true, what laws were violated?
-
- A few years ago, the U.S. Supreme Court ruled that community
- standards could be applied to determine "obscenity." But who is to
- interpret those standards? Police? Ministers? Who?
-
- And what of he question of community? Pensacola is a community and
- has somewhat understandable standards. But doesn't a computer network,
- comprised of people proven to be of age and engaged in a legal medium,
- also constitute a community?
-
- Should Pensacola's standards, or Hoboken's or Atlanta's, be
- applied to that electronic community?
-
- A problem here is that while technology has surged ahead, law has
- lagged behind. There are few laws that can be legitimately be applied
- in this case. And as for "pornographic material being sent over the
- computer," has anyone noticed what's available on television (NYPD
- Blue), on cable (HBO, Cinemax, The Movie Channel), or pay-per-view?
-
- There's the Playboy channel, Spice, etc. What's the difference
- between a computer, which requires passwords and access, and
- television which requires only a decoder and a telephone call to
- activate a channel?
-
- We're not condoning presentation or transmission of pornography.
- We're simply trying to understand what laws were broken, and how
- future infractions will play out. How will they be monitored? How
- enforced?
-
- We hope it's done better than the snatch-and-grab method we saw in
- this case where equipment was seized but no charges placed. That seems
- an overstep by law enforcement.
-
- If "obscene" material was being sent across electronic lines, a
- few visits to the bulletin board would have confirmed it and
- established a case. But the state seems to have acted first and
- thought later.
-
- That's a frightening prospect given the virtual explosion of
- information available via the computer, and the absolute lack of
- applicable law.
-
- [ That was the entire text of the editorial in the Pensacola News
- Journal, on Saturday, December 10 1994.]
-
- ------------------------------
-
- Date: Thu, 23 Oct 1994 22:51:01 CDT
- From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: File 5--Cu Digest Header Info (unchanged since 25 Nov 1994)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- In ITALY: Bits against the Empire BBS: +39-461-980493
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
- ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
-
- The most recent issues of CuD can be obtained from the NIU
- Sociology gopher at:
- URL: gopher://corn.cso.niu.edu:70/00/acad_dept/col_of_las/dept_soci
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #6.105
- ************************************
-
-
-