home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun May 15, 1994 Volume 6 : Issue 41
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Retiring Shadow Archivist: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Covey Editors: D. Bannaducci & S. Jones
-
- CONTENTS, #6.41 (May 15, 1994)
-
- File 1--Further info on the Tony Davis affair.
- File 2--Fidonet Crackdown in Italy
- File 3--hacker crackdown takes place in Italy
- File 4--German CDROM cracked
- File 5--PGP 2.5 available from EFF ftp site
- File 6--MTV SUES CURRY
- File 7--AOL Chat Rooms (In re: CuD 6.40)
- File 8--Re: "Child Abuse in Cyberspace"
- File 9--Re: CuD 6.27 -- Response to E. Weykers (in re 2600 Mag)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
-
- FTP: UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
- JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Sat, 14 May 94 18:05:00 -0600
- Message-Id: <125.372.27.0C3F6D46@irs.com>
- Subject: File 1--Further info on the Tony Davis affair.
-
- Have heard little mentioned on the net regarding this case recently.
- Saw a recent AP report on it though. Below is a summarized version.
-
- *****
-
- Jury Finds man guilty in computer porn case. (05-05-94)
-
- Anthony Davis faces up to five years in prison after an Oklahoma jury
- found him guilty of distributing obscene material on computer discs.
-
- District Attorney Robert Macy praised the work of the Oklahoma City
- Police Department's vice unit, which arrested Mr. Davis in July 1993
- during a raid at his software publishing business in south Oklahoma
- City.
-
- The jury found Mr. Davis guilty of two counts of distributing obscene
- material, one count of possession of obscene material, one count of
- trafficking in obscene pictures, and one count of illegal use of a
- computer.
-
- In addition to the prison sentence, Mr. Davis was fined about
- $33,000 and forfeited nine modems, two CD-ROM changers, four CD-ROM
- drives, two keyboards, two monitors, four power strips, two power
- boards, and two computers. Prosecutors say he is appealing the
- forfeiture.
-
- District Judge Richard Freedman considered dismissing the case because
- of concern that computerized images were not specifically included in
- the state's obscenity statutes.
-
- He allowed the trial to continue after prosecuters argued the obscenity
- statute cites "writings" and that CD-ROMs are writings contained in
- computer code. The statute also includes the term "pictures" and the
- images in question are computer reconstructions of pictures, the
- prosecution argued.
-
- Judge Freeman allowed Mr. Davis to remain free on bond pending formal
- sentencing on June 17.
-
- *****
-
- The article did not detail many of the pertinent facts regarding the
- case such as the excessive overreaching of the OK PD in seizing so much
- material when the warrant was *specifically* for CD-ROM disks only. The
- fact that Mr. Davis is a publisher of legitimate computer software and
- the CD-ROMs in question were from a third party supplier, Mr. Davis was
- acting as a distributor only of those CD's. No information was given as
- to the status of any suits Mr. Davis might have initiated against the
- authorities in question, regarding violations of the ECPA or the PPA.
-
- ------------------------------
-
- Date: Sun, 15 May 1994 11:37:04 -0700
- From: Bernardo Parrella <berny@WELL.SF.CA.US>
- Subject: File 2--Fidonet Crackdown in Italy
-
- On May 10-12 1994, the first nationwide crackdown on telecom nets was
- operated by Italian police.
-
- Acting after a warrant issued by a Prosecutor in Pesaro, about 60
- Bullentin Board Systems throughout the country have been visited and
- searched by police officials.
-
- Dozens of people were formally accused of "distribution of illegally
- copied software and appropriation of secret passwords" under the law
- approved by Italian Parliament in January this year.
-
- In several cases police officials didn't know what to search for, thus
- seizing computers, floppy disks, modems along with electric outlets,
- answering machines, audiotapes, personal effects.
-
- The raids also hit private houses and belongings, and in some places
- sleeping people were abruptly woken up facing machine guns.
-
- After searching probably around one third of the entire network - that
- includes more than 300 BBSes - police officials closed several Fidonet
- nodes, but no arrests were made.
-
- A still inaccurate figure of people were charged with software piracy, and
- dozens of computers and related devices were seized - along with
- thousands of floppy disks, CD-Roms, W.O.R.M.S.
-
- Moving after a suspected software piracy ring run by people involved
- in a Fidonet node, the crackdown started in the night between May 10
- and 11 in Milano, targeting in the two following days BBSes in Pesaro,
- Modena, Bologna, Ancona, Pisa and other cities.
-
- Fidonet Italia, member of the worldwide Fidonet network, is a
- non-profit organization devoted to distribution of shareware and
- freeware programs as well as to electronic forums on topics ranging
- from technological to social issues.
-
- An essential communication tool for several groups and individuals
- throughout the country, Fidonet Italia became an active multi-cultural
- vessel and distributor of several different nodes dedicated to
- specific issues: Peacelink (solidarity, human rights), Cybernet
- (cyberpunk), Ludonet (games), Scoutnet, Amynet, and others.
-
- For thousands of Italian people, Fidonet BBSes today are invaluable
- tools of information-exchange, social activism and professional
- activities.
-
- The network policy strictly prohibits any distribution of illegally
- copied software and fraudulent appropriation of secret passwords.
- Also, Fidonet is one of the few International organizations which has
- always stated and pursued a clear position against unauthorized
- copying software.
-
- At the moment, the raids seems to be motivated by accusations against
- two people involved in a Pesaro-based BBS who were using Fidonet
- contacts to allegedly distribute illegal copies of computer programs.
-
- However, there are no reasons for such a vast law enforcement
- operation. Most likely the prosecutor acted simply on the basis of
- the Fidonet telephone numbers list (publicly available) owned by the
- two suspected of software piracy.
-
- The vast majority of the people searched don't have any kind of
- relationship with the suspected, and many of the search warrants
- stated a generic "conspiracy with unknown" for the crime of software
- piracy.
-
- Particularly, the random and arbitrary seizures of floppy disks and
- personal computers are completely unmotivated, because every BBS is a
- completely independent structure and each sysop is running his/her own
- hardware and software.
-
- The seizures will resolve in a great economic loss for these people
- and their professional activities will be surely affected from
- negative publicity. Some of them own small computer-related companies
- while others are physicians, hobbyists, students who risk personal
- savings to run their services.
-
- Because police officials also seized electronic and paper archives
- containing data and numbers of the people who logged onto Fidonet
- nodes, it is evident that investigations are going even further - thus
- violating the constitutional right to privacy.
-
- The first result of this crackdown is that many Fidonet operators
- decided to shut down immediately their systems all over the country,
- fearing heavier police intrusions in both their public activities and
- private lives.
-
- While the Italian Parliament recently approved specific laws about
- copyright and piracy of computer software, there are still no rules to
- protect personal privacy in the electronic medium.
-
- This legislative void inevitably makes the sysop the only responsible
- person about anything happens onto and around his/her own BBS.
-
- Fidonet operators do not want and can not be the target of
- undiscriminated raids that, forcing them to closing down their
- activities, cause serious damages to themselves as well as to the
- entire community.
-
- In an article published Friday 13 by the newspaper "La Repubblica",
- Alessandro Marescotti, Peacelink spokesperson, said: "Just when the
- worldwide BBS scene is gaining general respect for its important role
- at the community level, in Italy the law hits those networks that have
- always been strongly against software piracy. Charging dozens of
- honest operators with unmotivated accusations, the main goal of this
- crackdown is directed against the social activities of small community
- nets - thus clearing the space for commercial networking."
-
- While terms and figures of the entire operation should still be
- clarified, on Sunday 15 Fidonet Italia operators will meet in Bologna
- to study any possible legal counter-action.
-
- ------------------------------
-
- Date: Fri, 13 May 1994 12:09:50 -0500 (CDT)
- From: David Smith <bladex@BGA.COM>
- Subject: File 3--hacker crackdown takes place in Italy
-
- ---------- Forwarded message ----------
- Date--Fri, 13 May 94 11:23:02 EET
- From--Riccardo Pizzi <staff@ita.it>
- Subject--Busted!!
-
- things are getting really bad here...
-
- On Wednesday, 11th of May, at 3:30 pm, the italian Feds came into my
- house while I was out of town for a consulting business. They went
- into my bedroom and seized all my equipment, diskettes, tapes. This
- action was part of a nationwide raid against software piracy that hit
- some other 40+ FIDONET sites (yes, they seem to have used a Fido
- nodelist to find out about sites to investigate). Needless to say, I
- didn't even had DOS on my disk drives, let alone any copyrighted
- software. Anyway, they have now all my work of the latest 5 (five)
- years, including all backup copies of UniBoard and related stuff..
- and I don't know if I will be ever able to have all my stuff back. I
- have also lost my nervous.com email address, but I can be reached here
- as <staff@ita.it>; I will try to keep you informed about this (very
- bad) story. Please, forward this to the alt.bbs.* groups, since I do
- not have news access here, and am also missing all the email addresses
- of my customers and friends..
-
- Wish me luck,
-
- Rick
- Riccardo Pizzi, SysAdmin Tel-- +39 71 204046
- I.T.A. Informatica e Fax-- +39 71 2073033
- Tecnologie Avanzate s.r.l. E-Mail--staff@ita.it
-
- ------------------------------
-
- Date: Sun, 8 May 94 22:25:00 UTC
- From: grmeyer@GENIE.GEIS.COM
- Subject: File 4--German CDROM cracked
-
- The Fairytale of Data-Encryption
- or
- How to Crack a CD ROM full of Commercial Software
-
- by HOWARD FUHS 100120.502@compuserve.com
-
- ((MODERATORS' NOTE: The following article details the events of a
- CD-ROM "software sampler" that was promptly cracked by some German
- programmers. We've edited the article slightly, but for the most part
- have left it as it was submitted. Please note that English is not the
- first language of the author.))
-
- Once upon a time a company decided that the world might be ready and
- so they tried to invent a new way of distribution for commercial
- software. It was a few weeks before the CeBit Computer Fair in
- Hannover and the company sent out merry men to talk to the giants of
- the software industry. The software giants listened well and thought
- it might be a very good idea. They accepted and so they started to
- distribute their good and expensive software in an encrypted form on a
- CD ROM.
-
- The encryption software was especially programmed for the inventive
- distributor and he believed that the encryption was so secure that
- even a evil hacker can't get access to the software. According to an
- official statement of the company, the encryption method is similar to
- DES and as secure as DES.
-
- His project has to become a success so he gave away the CD ROM for a
- fee of 10 DM ( $ 6.-) and the Ziff Verlag (German office of the Ziff
- Publishers with own magazines in the german language) distributed the
- CD ROM for free as an inlet in one of their magazines. And, really,
- the CD ROM was a success. But that's not enough. To complete the total
- success of the project, the CD ROM was given away on the CeBIT
- Computer Fair. What a success! About 300 000 CD ROMs were produced.
- Most of them were given away. The distributing company claimed in
- some public statements that this might be the future way to distribute
- commercial software and they will lead the pack.
-
- The content of the CD ROM was the "Who is Who" of the software giants.
- Novell, Microsoft, Lotus, Borland and so on. The software giants
- claimed that the total value of the software is more than 100 000 DM
- (70 000 $) and they all were pretty sure that this concept will be
- very successful.
-
- The future concept was to generate a checksum with a program which
- was also the content of the CD ROM. This checksum was calculated
- especially for that program the daring user wanted to buy. The user
- just had to call a hotline number of the distributing company and tell
- the operator the software package he wanted to purchase. The operator
- asked for the generated checksum and the credit card number. After
- verification the operator gave away the golden key to decrypt the
- desired software.
-
- For using the golden key the user had to start the decryption
- program which was also stored on the CD ROM. The decryption program
- asked for the key, and voila, the decrypted commercial software can be
- stored on diskettes ready for installation. Life can be so easy.
-
- What a challenge for a really bad, mean and intelligent hacker. First
- of all, he checked the content of the CD ROM - and found a strange DLL
- file. After a close look at the DLL file the Gentleman started his
- debugger and checked the whole decryption program. And after a few
- days of work he was able to write a program to calculate the
- decryption codes. He still refuses to tell the public in which way he
- was able to crack the encryption of the software.
-
- Members from the Chaos Computer Club in Hamburg claim that the intend
- was to show how easy it is to crack the encryption and not to get
- access to the commercial software. The fact was told to the
- distribution company and the Ziff Verlag during the CeBIT and was
- demonstrated in front of an audience. Both companies stopped the
- distribution of the CD ROM immediately.
-
- The results of the crack:
- Everybody is looking for the CD ROM. People are willing to pay more
- than 100.- DM for the CD ROM and are looking for crack codes or the
- crack program. The first crack codes are appearing in the FIDO Net.
- And a lot of cracks are working almost fine. Two persons tried to sell
- faked crack programs for 200.- DM each.
-
- The giants of the software industry are checking the possibility to
- charge the distribution company for the amount of more than 3 Billion
- US$. In an official statement the giants are claiming that they will
- lose more than 3 Billion US$. If it is necessary they will bring the
- case to court.
-
- There is no official statement from the distribution company.
-
- Each and every newspaper or news service was selling the story all
- over Germany. Even if they have not the faintest idea what they are
- talking about.
-
- Depending on the point of view, the CD ROM and the distribution
- concept were very successful.
-
- ==end==
-
- ------------------------------
-
- Date: Wed, 11 May 1994 16:46:49 -0400 (EDT)
- From: Stanton McCandlish <mech@EFF.ORG>
- Subject: File 5--PGP 2.5 available from EFF ftp site
-
- With the early May announcement of the availability of the new version
- of PGP (Pretty Good Privacy) a free encryption program for email and
- other files, EFF has decided to provide PGP and other cryptographic
- material to users of the Internet. EFF applauds and congratulates the
- PGP development team, MIT (who initially made PGP 2.5 available), and
- RSA Data Security (patent holders of the RSA and RSAREF encryption
- code) for coming to an agreement and providing this new version of the
- most popular email encryption program in the world - a free version
- that is finally legal in the US.
-
- Previous versions of PGP arguably violated US patent law, with the
- exception of ViaCrypt's commercial PGP 2.4, but the new 2.5 is built
- upon the free RSAREF encryption functions, rather than the previous
- RSA functions which required a special licensing arrangement for use
- in applications like PGP.
-
- Despite the patent & licensing issues being resolved, PGP is still not
- legally exportable from the United States (except to Canada), due to
- ITAR export restrictions which categorize cryptographic materials as
- weapons of war. Thus, EFF can only make PGP and other crypto tools
- and source code available to US and Canadian nationals currently
- residing in the US or Canada and connecting to EFF's site from a US or
- Canadian site.
-
- PGP and similar material is available from EFF's ftp site in a hidden
- directory, and only to Americans and Canadians. Access to this
- directory can be obtained by reading and following the instructions in
- the README.Dist
- file at:
-
- ftp.eff.org, /pub/Net_info/Tools/Crypto/
- gopher.eff.org, 1/Net_info/Tools/Crypto
- gopher://gopher.eff.org/11/Net_info/Tools/Crypto
- http://www.eff.org/pub/Net_info/Tools/Crypto/
-
- PGP can only be obtained from EFF via ftp currently. Gopher and WWW
- access to the material itself is not supported at this time.
-
- Only the DOS and Unix versions of PGP 2.5 have been released so far.
- The Unix version is in source code form, and so can be readily ported to
- VMS, NeXT and many other operating systems. A Macintosh version has yet to
- be released.
-
- If you would like to see US export restrictions on cryptography removed,
- please send a message supporting Rep. Cantwell's export reform act (bill
- HR3627) to cantwell@eff.org, ask your Representatives to co-sponsor this
- bill, and ask your Senators to co-sponsor Sen. Murray's companion bill
- (S1846) in the US Senate. Congress contact information is available from
- ftp.eff.org, /pub/EFF/Issues/Activism/govt_contact.list
-
- ------------------------------
-
- Date: 10 May 1994 03:44:36 -0400
- From: curryco@PANIX.COM(Adam Curry)
- Subject: File 6--MTV SUES CURRY
-
-
- [IMAGE] MTV SUES CURRY
- ===============================================================
-
- Last update: May 10 1994
-
- _New Jersey, May 10 1994_
-
- I had planned to keep the following quiet until more information was
- available, but since several journalists have already caught wind of
- it, I decided to get it out into the open so my side of the story is
- heard as well.
-
- The domain I maintain and operate on the Internet, mtv.com was founded
- approximately one year ago. At that time I registered mtv.com with the
- InterNIC, purely because it was a cool address to have, and it was
- available. What a great "vanity plate"!
-
- The site quickly became a frequently accessed "hangout" on the net,
- with an average of 35000 accesses daily from Mosaic clients alone.
- During the start up months I had many conversations with executives at
- MTV Networks about my endeavors, which btw, were all financed out of
- my own pocket, and vps from MTV Programming as well as Viacom New
- Media were aware of what I was doing on the internet, and although
- they stated "MTV has no interest in the internet" they gave me their
- blessing and supported my efforts.
-
- This was enforced when I set up several email accounts on mtv.com for
- use in MTV's on-air programming. Ever since the summer of '93,
- popquiz@mtv.com was used for trivia quiz questions, that were then
- aired on MTV's "Most Wanted" a program I hosted at the time.
- Solicitations were made on the air, and the address was shown on the
- screen. For MTV's annual Valentines video dedications, viewers were
- offered the choice of calling in their dedications, or sending them
- via email to elove@mtv.com.
-
- I never charged MTV Networks for this service, I purely saw it as a
- cool feature to introduce to MTV's programming, spreading the
- "gospel", so to speak.
-
-
- Then I started to get a lot of press about mtv.com, and some people
- started to wake up at 1515 Broadway (MTV's HQ in New York City). And I
- was served with a "Cease and desist" on the use of mtv.com. MTV's
- attorneys claimed that there could be "confusion" for users of the
- internet, when connecting to *anything* that had the letters mtv in
- the address, and then receiving music and entertainment information. I
- was obviously hurt by this move, but did see what point they were
- driving at, an asked if we could settle this matter amicably.
-
- The situation cooled down for a couple of months, but when I resigned
- on-air from my job as a VJ, which MTV chose not to air btw, things
- started to get ugly.
-
- Long story short, MTV Networks has filed a lawsuit against me, for
- copyright infringement of their "trademark", that being their "MTV"
- call letters, as well as having information online that was MTVN
- "property". In this case they are referring to several press releases
- I put up on mtv.com, such a an announcement about Beavis and
- Butthead's "experience" cd release. Understand that MTVN sent me these
- releases over their own internal computer network for this very
- purpose! Again, I was only doing this to promote the channel, not for
- my own personal gain..after all...mtv.com is free access for all, no
- charge.
-
- Throughout all of this I have offered to maintain the site
- specifically for mtv, but again they said "we're not interested".
- Of course I have no problem whatsoever removing all references to MTV
- Networks and it's projects from mtv.com, no that I don't work there
- anymore gives me even more reason to want to do this, but the kicker
- is they are moving for an injunction to make me stop using the
- internet address mtv.com!
-
- This is ofcourse totally unacceptable, I registered the domain name,
- and I don't plan on giving it up. Sure MTV and their parent company
- Viacom have a vast legal team, but david also nailed goliath, so I
- have faith. In the long run, everyone knows that the only *true*
- winners will be the lawyers.
-
- There are many different viewpoints on this situation, but I feel that
- the use of mtv in an addressing scheme can't be seen as an
- infringement of intellectual property laws, and a search of the
- InterNIC database shows at least 15 domain names registered with mtv
- in the address. Irony is that I incorporated a company called ON RAMP,
- Inc (tm) and onramp.com was already registered to someone else, but
- I'm not suing them :)
-
- It appears to me that MTV has their mind set on the address mtv.com,
- maybe not for now, but possibly for future use, and I feel extremely
- used, in that I built up quite an audience for that address, and they
- are basically saying "thank you very much, you may go".
-
- A pre-motion hearing is scheduled for this thursday morning at 11am,
- wit the honourable Judge McKenna presiding, in an attempt to get an
- injunction to make me stop using the address mtv.com. I will update
- the situation as it unfolds.
-
- Adam Curry, adam@mtv.com
-
- ------------------------------
-
- Date: 9 May 94 17:48:36 GMT
- From: dbatterson@ATTMAIL.COM(David Batterson)
- Subject: File 7--AOL Chat Rooms (In re: CuD 6.40)
-
- This is a followup to Howard Rheingold's article, "Why Censoring
- Cyberspace Is Futile," Cud #6.40.
-
- Young Gay Chat Rooms on America Online
- by David Batterson
-
- America Online (AOL) took some heavy media hits over the widely
- reported story involving a 14-year-old boy and an adult male he met
- through the online service. As a result, AOL's TOS (Terms Of
- Service) dept.--also known as TOSAdvisor--began a crackdown on
- certain Member Rooms.
-
- As a clarification, chat rooms on AOL consist of three types:
- Public, Member and Private. Public Rooms are as described, and
- explicit language of a sexual, "vulgar" or "bashing" nature is now
- allowed under TOS guidelines. AOL has volunteers called Guides who
- help keep order.
-
- Member Rooms are created by AOL users who want to meet others,
- generally for "dating" and sexual reasons. More explicit language is
- tolerated in such rooms, since users specifically go looking for
- these rooms. Examples of Member Rooms are "Married but not dead,"
- "Yng Men 4 Older Women," "Men 4 Men," "Bi F 4 Bi F," "Men's Locker
- Room," "Fantasies and Dreams" and so forth.
-
- Guides can enter Member Rooms, but don't do so as much as they
- do Public Rooms. When AOL users want total privacy, they can create
- a Private Room where even Guides and TOS representatives cannot
- enter.
-
- Because AOL came under pressure, TOS started removing rooms from
- the Member Rooms list with names such as "Yng M 4 Yng M." Such rooms
- are frequented by gay and bisexual teens and young adults, although
- older adults may also access the rooms too.
-
- After complaints against TOS by a number of users--and a
- petition campaign launched by a teen AOL subscriber, and a request
- from me to TOS for an explanation, I received the following e-mail:
-
- "To avoid giving the impression that we allow solicitation of
- minors online, we are very cautious in allowing room names
- referencing youth. Anything that could possibly be construed as
- sexual is usually made private. 'Yng M 4 Yng M falls under this
- category. It is ambiguous in that 'M' could mean 'male', hence
- underage male.
-
- You may create the room 'Yng Men 4 Yng Men', which specifically
- states that the occupants seek to meet adults. I hope this clears up
- our position on this." The letter was signed by Pete, Terms of
- Service Advisor, America Online, Inc.
- #
-
- NOTE: Following is an excerpt of e-mail from the person who
- circulated the petition on AOL. It speaks for itself. He wishes to
- remain anonymous, for obvious reasons.
-
-
- Subj: Re: TOSAdvisor hysteria
- Date: 94-05-07 21:45:46 EDT
- From: KC 16M
- To: Dbatterson
- Posted on: America Online
-
-
- I hope you find relevant remarks contained herein for anything you
- wish to write. Feel free to forward it as an example of how not
- everyone's writing skills have been damaged by the American
- Educational System. :-)
-
- In making any statement of position, I strongly believe that I echo
- the views of teenagers, both gay, bi, and straight.
-
-
- WHO I AM
-
- I am soon to be a 17 year old male. I'm from down-state New York. I
- am a president of a prominent nationwide youth group and a former
- vice-president of an honor student's organization. I have a number
- of years experience in dealing with peer counseling and in active
- leadership roles.
-
- I have never been a gay rights activist. I am a teen activist and am
- involved currently with 3 organizations. I don't have time for a
- typical social life, because I am dedicated to my interests. While
- this has a number of low points (I can only be on AOL at midnight,
- and sometimes fall asleep while typing), it has many very lofty
- rewards that I enjoy. I have received certificates, awards, and many
- thank you cards in the last 3 years.
-
- I am an honors student, and have a particular interest in education
- techniques, cognitive and behavioral psychology, and human
- sexuality. I have audited college classes on those topics for 2
- years (at night!).
-
- WHY I'M GETTING INVOLVED IN A PETITION
-
- As a high school student, I am well aware of the discrimination that
- affects my generation. I have many gay friends online as a result of
- my own exploration of sexual identity and have not settled on any
- singularity of attraction yet.
-
- While I don't limit my online friends to any particular group, I
- identify with the struggle that fellow teens have in keeping a room
- open for discussion and FUN of relevant issues. If an issue so
- immediate as sexuality can be considered a relevant issue, then rooms
- should be available for it.
-
- To state it simply: If it can be available for adults, why should
- there be a limit in what is available for teens? Don't even bother
- with the law, as it cannot be enforced in a domain where people won't
- give out more than their screen names to strangers.
-
- What about the dumb kids who give out personal information? Well,
- don't worry about them; they are just as likely to drown in a bowl of
- cereal.
-
- WHY PETITION?
-
- A petition will demonstrate to AOL that there is an interest in it,
- by teens FOR TEENS. We are not stockholders. We are customers. AOL
- provides a computer and networking system....we use it. AOL gives
- ground rules for using it....we follow them. AOL requires
- payment...we pay. Customers want something done....business doesn't
- respond.
-
- Notice the problem? :-)
-
- There are many admirable aspects of the system. What we want is the
- huge corporate entity to respond to its customers, as any other
- company must. All of us who use AOL have money at our disposal, and
- we use it freely.
-
- HOW WE INTERPRET AOL's POSITION ON TEEN ROOMS:
-
- It seems highly hypocritical for an organization, for-profit
- especially, to discriminate against gay teenage males simply for
- their age. Notice, we are not discussing the issue of homosexuality,
- per se, because it is obvious that AOL is a gay-friendly employer and
- company."
-
- It is hypocritical for a few reasons:
-
- 1) There already exists "teen chat" rooms. If the policy of AOL
- was to protect minors from untoward sexual advances from
- perverts/adults in those rooms, they would not exist.
-
- 2) There already exists "gay adult" rooms. There are "adult chat"
- areas. Now that we've established that there are teen rooms, adult
- rooms, and adult gay rooms, the question we should think about is,
- "Why aren't there gay teen rooms?"
-
- 3) Screen names make it impossible for adults and teens to tell
- each other apart. One method we use is discussion of relevant issues
- (including sex); those who are unable to relate to the discussion are
- "Pervs" who we know to avoid.
-
- 4) There are procedures for dealing with perverts, which most
- teens (in contrast with most of the adults we've encountered) are
- familiar with. Flooding e-mail boxes of annoying perverts,
- IGNORE'ing them in chat rooms, and shutting off our Instant
- Message'ing are all very effective methods. In addition, there
- already exists many corporate techniques of handling jerks,
- such as "GuidePager" and TOS.
-
- 5) We are not defenseless, nor innocent. Most, though not all, o
- the teenage users of AOL have extensive "modeming/BBSing" experience.
- We are neither ignorant of the protection that AOL provides through
- screen names, or of how to handle an annoying person.
-
- In essence, the issue is one of age discrimination for teenagers who
- do not need protection. Another user on AOL wrote: "a request has
- already been made to the GLCF (Gay Lesbian Community Forum) on AOL to
- have an adult-monitored teen room for outreach, networking and
- discussion."
-
- I don't wish to sound arrogant or resentful, but that is an
- adult-centered approach. It doesn't recognize the fact that most
- teenagers, sexually explorative or not, are uncomfortable by any
- adult presence. If teens know that an adult is present, we will IM
- (Instant Message) each other, and go to a private room.
-
- Further, to assume that perverted adults will not enter that room i s
- to dismiss that they are just as capable of creating phony profiles
- as anyone else...a foolish assumption by any person.
-
- Some of what is written below is repetitive, but may serve to further
- clarify our position. Because QUIRK [GLCF Forum Host] took the time
- to write out specific logistical questions, I'll repeat them with
- answers that I hope you both can use (IN KEEPING WITH THE SPIRIT OF
- QUIRK'S NAME, MY ANSWERS ARE IN CAPS):
-
- * How can AOL insure that such a space will not become a magnet for
- chickenhawks?
-
- THEY CAN'T. NOR, FROM A LEGAL PERSPECTIVE, EVEN TRY. ONCE AN
- ORGANIZATION TAKES A POSITION WHEREBY IT SEEKS TO "PROTECT" ITS
- CUSTOMERS, IT BECOMES LIABLE FOR INFRACTIONS. THE SMARTEST APPROACH
- WOULD BE TO ACKNOWLEDGE THAT AOL IS A DATABASE AND NETWORKING SYSTEM,
- NOT A SOCIAL AGENCY. IN DOING THAT THEY DISCLAIM AND INDEMNIFY
- THEMSELVES FROM ANY LIABILITY RESULTING FROM ABUSES OF THAT NETWORK,
- WHERE USE OF THE NETWORK CONSTITUTES A VIOLATION OF LAW.
-
- * What restrictions/rules are teens willing to generate and adhere to
- that will keep adult predators out of the area?
-
- A FEW BASIC ONES. PRIMARILY, WE WOULD AGREE TO LIMIT EXPLICIT
- SEXUAL DISCUSSIONS TO INSTANT MESSAGES AND PRIVATE ROOMS. WE WOULD
- AGREE THAT THE "TOS" RULES WILL REMAIN IN EFFECT FOR PUBLIC CHATTING.
-
- WE WOULD AGREE THAT AN ADULT'S PRESENCE, AS DEFINED BY THE ROLE
- OF "GUIDES", IS TOLERABLE. IN PRACTICE AND THEORY, GUIDES ARE
- NOTIFIED ONLY WHEN THERE IS JUSTIFIABLE NEED, THOUGH THEY ARE SOCIAL
- CREATURES WHO LIKE TO POP INTO "TEEN ROOMS" ANYWAY. HOWEVER, WE
- WOULD NO MORE APPRECIATE A CONTINUOUS PRESENCE THAN ANYONE OF ANY
- OTHER GROUP WOULD.
-
- * How will you verify the age of the teens using such a space?
-
- WE CAN'T, NOR SHOULD. AOL SHOULD DISCLAIM ITSELF OF ANY ABILITY
- TO VERIFY AGE. WE ARE ALL CUSTOMERS OF AOL FOR 3 COMMON REASONS: 1)
- CONVENIENCE/ACCESSIBILITY, 2) AFFORDABILITY, 3) ANONYMITY.
-
- * Who will monitor the area to make sure the it remains "youth only"
- ?
-
- OFFHAND RESPONSE: THE THOUGHT POLICE.
-
- REAL RESPONSE: WE WILL. IT IS WITHIN OUR ABILITY TO IGNORE
- MAIL, IGNORE PEOPLE IN CHAT ROOMS, AND IGNORE INSTANT MESSAGES. AOL
- IS NO MORE DANGEROUS THAN SPITTING OFF A BRIDGE. THE TIME IS NOW TO
- SHOW AOL THAT WE DON'T WANT, OR NEED, TO BE PROTECTED FROM OURSELVES.
-
- -KC 16M
-
- ------------------------------
-
- Date: Mon, 9 May 1994 23:47:52 -0700
- From: jonpugh@NETCOM.COM(Jon Pugh)
- Subject: File 8--Re: "Child Abuse in Cyberspace"
-
- >The story continues with the case of Donald Deatherage, 27, of
- >Cupertino, Calif. Deatherage, known as "HeadShaver" on America Online,
- >was accused by police of using his computer to prey on a 14-year old
- >boy with whom he had struck up an on-line conversation. Deatherage was
- >accused of eventually meeting the youth, handcuffing, shackling, and
- >blindfolding him, and spanking him with a leather belt (among other
- >more serious acts).
-
- I'm not really sure what to say here, but I know Matt Deatherage from work.
- I used to work for Apple in the same group as Matt (that's his middle name
- and the one he goes by). I haven't spoken with him since his arrest, but I
- have talked with his boss who has spoken with him and I know a few more
- details than are represented in the above excerpt.
-
- My wife asked me if Matt was "normal". I can't really say. So few of us
- in the computer business qualify in the strictest sense. He's a big guy
- who kept his hair really short, like some athletes do. That must be where
- he got his login name from. He's been into computers since the early Apple
- II and was doing Macintosh technical support until his 6 week sabbatical
- during which he was arrested. I don't really know him very well, but he
- has helped me on a number of complicated technical problems and was always
- willing to assist. I always liked him for that.
-
- Matt has been in jail on a half million dollars bail since his arrest. He
- has pleaded no contest to the charges and is currently awaiting sentencing.
- A number of the people that he has helped over the years have gathered an
- online petition asking the judge to show leniency.
-
- According to reports I have read and heard, Matt did not abduct the 14 year
- old boy he was charged with molesting. The kid told his parents he was
- going to a party in Santa Cruz and then met Matt instead. The only way
- this was even discovered was when the boy's father read through his email
- at some later date.
-
- Now, I'm certainly not advocating, endorsing or even justifying Matt's
- actions, but I definitely think that there is a difference between
- voluntary and involuntary actions. There is no indication that Matt forced
- this boy into anything. In that regard, I support the request for leniency
- for Matt. I don't really believe that he is dangerous or a threat. I'm
- just afraid that given a beginning as outrageous as $500,000 bail, Matt is
- finding out about the harsh side of the law.
-
- Jon
-
- ------------------------------
-
- Date: Thu, 12 May 1994 18:00:34 -0400 (ADT)
- From: The Advocate <cudigest@mindvox.phantom.com>
- Subject: File 9--Re: CuD 6.27 -- Response to E. Weykers (in re 2600 Mag)
-
- Dennis Weyker here responding to Emmanuel Goldstein:
- >CORPORATE RULES
- >. . . This puts us at direct odds with many organizations, who believe
- >that everything they do is "proprietary" and that the public has no
- >right to know how the public networks work. In July of 1992 we were
- >threatened with legal action by Bellcore (the research arm of the
- >Regional Bell Operating Companies) for revealing security weaknesses
- >inherent in Busy Line Verification (BLV) trunks. The information had
- >been leaked to us and we did not feel compelled to join Bellcore's
- >conspiracy of silence.
-
- !See my earlier comments about publishing security holes or sharing
- !them with hackers before letting the sysadmins have adequate warning
- !and time to fix the hole. Instant publication of holes is not socially
- !responsible.
- !
-
- No more "Ir-responsible" then the producer of a commercial product
- producing something that is defective. 2600 has no fiduciary duty
- to customers, while the manufacturers do. The fact is most vendors
- take a fiddle while rome burns approach to product quality.
-
- WHy don't you remind them to get their acts together first.
-
- !Also, publishing one company's private data can in some cases create a
- !competitive disadvantage relative to that company's competitors with
- !real economic effects. If Phrack runs a long series of articles about
- !"how to hack the new Fujitsu switches", the communications engineer at
- !BellAtlantic deciding what brand of switch to buy may decide to buy
- !some other brand of switch besides Fujitsu. And he might be doing this
- !solely of the publication of those articles makes him think (rightly
- !or wrongly) that the Fujitsu's switch is more likely to get hacked
- !into than, say, Northern Telecom's. Phrack has just transferred wealth
- !from Fujitsu to Northern Telecom and possibly influenced the telco
- !into buying the less competitive switch (which could wind up
- !increasing telco operating costs and users' rates) out of fear of
- !getting hacked.
- !
- !Moral: not all arguments about the social and commercial value of
- !keeping proprietary information secret are bogus.
-
- Spoken words of wisdom from a man who has obviously never been involved in
- a procurement decision. 90% of the product reviews i saw in trade rags
- were utter and complete Horse Feces. I saw one review signed by
- a person in my chain of command that gave glowing remarks to
- a development product. Our internal review had so scathed it, that
- it was removed from the system so we could get real work done.
-
- If 2600 points out the truth for once, it is the continuation of
- Diogenes trek with the lantern looking for one honest man, or in
- this case, one honest vendor.
-
- The rest of weykers comments aren't even worth responding to.
-
-
- Your Friend
-
- The Advocate.
-
- ------------------------------
-
- End of Computer Underground Digest #6.41
- ************************************
-
-
-