home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 49.1 KB | 1,127 lines |
- Computer underground Digest Wed Sep 28, 1994 Volume 6 : Issue 85
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Retiring Shadow Archivist: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Urban Legend Editor: E. Greg Shrdlugold
-
- CONTENTS, #6.85 (Wed, Sep 28, 1994)
-
- File 1--"Green Card Lawyers" Threaten T-Shirt Maker
- File 2--ACLU letter and release on FBI Wiretap bill
- File 3--Internet Security Seminar (Nov 12 '94)
- File 4--Police, Press, and Porn in Toronto
- File 5--Canadian BBS Sysops Plead Guilty to "Piracy"
- File 6--PHRACK hardcopies available from SotMESC / GCMS
- File 7--ACLU Gopher
- File 8--Telecommunication Reform Bill (S. 1822) DEAD!
- File 9--Cu Digest Header Information (unchanged)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ----------------------------------------------------------------------
-
- Date: Tue, 20 Sep 1994 16:42:43 -0400
- From: eye@IO.ORG(eye WEEKLY)
- Subject: File 1--"Green Card Lawyers" Threaten T-Shirt Maker
-
-
- Toronto's arts newspaper .....free every Thursday
- ===================
- EYE NET EYE NET
-
- ALL HAIL THE CHIC GEEK!
- Scum-sucking weasel lawyers as fashion statements
-
- by
- K.K. CAMPBELL
-
-
- Coupla weeks ago, eye Net reported how North Carolina university
- student Joel Furr (jfurr@acpub.duke.edu) designed a popular
- collectible -- T-shirts about net.poltergeist "Serdar Argic." Furr
- promised to follow-up with a T-shirt featuring Arizona lawyers
- Laurence Canter and Martha Siegel.
-
- On June 18, eye Net reported how this wife-and-hubby law team sent
- an ad for the American "Green Card lottery" to thousands of
- newsgroups (win a work permit raffle run by the U.S. government;
- C&S offered to fill in a few forms for merely hundreds of dollars).
- This posting tactic is called "spamming." C&S did it twice.
-
- Spammers are loathed. Commercial spammers are loathed more.
- Snotty lawyer commercial spammers attain monumental loathing. So
- 'twas no surprise C&S were mailbombed into oblivion after each
- spam attack against Usenet. Both times, the lawyer's Internet
- providers terminated their account after a global deluge of
- complaints.
-
- The legal weasels squealed in anger and threatened to sue their
- Internet providers. But nothing came of it.
-
- Now they've threatened to sue Furr over his little non-profit T-shirt
- featuring the net.vermin. Shirt design features a four-color logo of a
- hand clutching a green card bursting forth from a globe. Around it:
- "The Green Card Lawyers -- Spamming the Globe."
-
- On Aug. 8, Furr publicly announced C&S had sent him private email, a
- standard nasty-lawyer letter. C&S asserted the "use of their names,
- likenesses or nickname is prohibited" -- meaning he couldn't even
- call them, "The Green Card Lawyers." Furthermore, Furr was
- informed "several large companies" had contacted the lawyers about
- a line of C&S T-shirts and Furr's plan to sell maybe 10 dozen shirts
- "would hurt their marketability."
-
- A clarification: Furr's shirt mocks C&S -- who the hell would wear
- it, let alone buy it, otherwise? The claim that "several large
- companies" are considering issuing a friendly C&S shirt is a source
- of much mirth and merriment about Planet Earth.
-
- Furr knew C&S was fullashit -- indeed, most of Usenet-reading
- Planet Earth is sure they're fullashit -- but, being a student, he
- knew he'd neither the time nor resources to fight a nuisance suit.
- Thus he concluded his Aug. 8 public post: "I think I have lots and lots
- of legal legs to stand on, but I can't afford to fight a lawsuit." The
- term "Green Card Lawyers" would be removed from the shirt.
-
- But Furr's mailbox soon brimmed with offers of legal assistance,
- even monetary help -- anything to thwart the most hated husband-
- wife team in Usenet history. (And Canter has said several times he's
- going to write a book about how to advertise on the net!)
-
- Electronic Frontier Foundation's chief legal counsel Mike Godwin
- (mnemonic@eff.org) advised Furr C&S "threats" were impotent bluster,
- Furr told eye in a telephone interview, because 1) C&S are not members
- of the Arizona bar; 2) they are under investigation by the Tennessee
- bar; 3) they can sue only in the state in which Furr does business; and
- 4) they have no trademark over the term "Green Card Lawyers."
-
- This last means that just because Usenetters call C&S the "Green
- Card Lawyers" doesn't grant them a trademark on the term. For
- instance, eye calls them the "Two-Bit, Suck-My-Left-Nut Lawyers"
- -- Martha and Larry don't own that name either.
-
- Bottomline: Furr's going ahead with the original design.
-
- "Green Card Lawyers" T-shirts are $11 U.S. -- XXL $1 more, XXXL $2
- more. Canadians add $1. Write Furr for more details. To join the
- net.collectibles mailing list, send email with the message
- "subscribe netstuff" (without the quotes) to
- majordomo@acpub.duke.edu . For the latest on the net.vermin, read
- alt.flame.canter-and-siegel .
-
- ===========
- Retransmit freely in cyberspace Author holds standard copyright
- Full issue of eye available in archive ==> gopher.io.org or ftp.io.org
- Mailing list available http://www.io.org/eye
-
- ------------------------------
-
- Date: Mon, 26 Sep 1994 17:57:50 -0400
- From: ACLU Information <infoaclu@ACLU.ORG>
- Subject: File 2--ACLU letter and release on FBI Wiretap bill
-
- ACLU * ACLU * ACLU * ACLU * ACLU * ACLU * ACLU * ACLU * ACLU
- NEWS RELEASE * NEWS RELEASE * NEWS RELEASE * NEWS RELEASE
-
- ACLU Opposes FBI Wiretap Access Bill;
- Legislation Would Create Dangerous Precedent
-
- For IMMEDIATE RELEASE
- September 26, 1994
-
- Contact: Barry Steinhardt
- BarryS @ aclu.org
- or Kathy Parrent, 212-944-9800, ext. 424
-
-
- The American Civil Liberties Union today called on the House
- Judiciary Committee to reject the FBI Wiretap Access Bill, H.R. 4922,
- which would require private electronics manufacturers to insure that the
- FBI can wiretap using developing telecommunications technologies.
-
- In a letter sent to Congressman Jack Brooks, Chair of the House
- Judiciary Committee, the ACLU stated that the bill "... creates a
- dangerous and unprecedented presumption that government not only has the
- power, subject to warrant to intercept private communications, but that it
- can require private parties to create special access. It is as if the
- government had required all builders to construct new housing with an
- internal surveillance camera for government use."
-
- "Moreover, the FBI has not borne the burden of proving why such an
- extraordinary requirement is necessary..." the letter said.
-
- A copy of the full letter with the ACLU's detailed objections
- follows.
- ___________________________________________________________________________
-
- September 22, 1994
-
-
-
-
- Honorable Jack Brooks
- Congressman, State of Texas
- 2449 Rayburn House Office Building
- Washington, D.C. 20515-4309
-
- Dear Congressman Brooks:
-
- We are writing to you to express the ACLU's opposition to the
- FBI-Wiretap Access Bill, H.R. 4922. While we were not actively involved
- in Subcommittee deliberations, we have reviewed the legislation and we
- have several major concerns.
-
- The principal problem remains that any digital telephone bill
- which mandates that communications providers make technological changes
- for the sole purpose of making their systems wiretap-ready creates a
- dangerous and unprecedented presumption that government not only has the
- power, subject to warrant, to intercept private communications, but that
- it can require private parties to create special access. It is as if the
- government had required all builders to construct new housing with an
- internal surveillance camera for government use. Even if such use were
- triggered only by a judicial warrant, such a requirement would be strongly
- resisted by the American people. H.R. 4922 establishes a similar
- requirement, and is without precedent.
-
- Moreover, the FBI has not borne the burden of proving why such an
- extraordinary requirement is necessary. In 1993, there were fewer than
- 1,000 wiretaps authorized and many of them failed to yield any substantive
- evidence while intercepting many innocent conversations. It is far from
- clear that digital telephones will substantially obstruct legitimate law
- enforcement efforts. Without further public discussion and debate, the
- public will not have a sufficient opportunity to weigh the loss of privacy
- against the FBI's claims. There has been no opportunity to learn the full
- extent of the types of investigations that the FBI claims were precluded
- because of a restriction on their public dissemination. Yet, based on
- these secret assertions, 91 such incidents were cited by the FBI. On
- those slim assertions, the public's loss of privacy in digital
- communications is all but assured and taxpayers will be asked to pay an
- extraordinary price.
-
- H.R. 4922 authorizes $500 million over the next four years to
- reimburse telecommunications carriers for the costs that would be imposed
- by the bill. Even if you accept these cost estimates -- the industry puts
- the real cost in the billions -- we will spending $125 million or $125,000
- per wiretap, for the fewer than 1,000 taps that will be conducted each
- year.
-
- As you know, the ACLU has the greatest respect for Congressman
- Edwards and Senator Leahy. Both have been tireless champions for civil
- liberties. The Edwards/Leahy proposal is an improvement over earlier
- versions offered by the FBI and we applaud their efforts to add new
- privacy protections.
-
- The proposed expansion of the Electronic Communications Privacy
- Act to cordless phones and the requirement that a court order be obtained
- for transactional data from electronic communication providers both are
- steps forward and merit separate consideration by the Congress. But they
- cannot and should not be traded for the unprecedented intrusion
- represented by H.R. 4922.
-
- In several respects, H.R. 4922 is still too broad in its
- application.
-
- For example, earlier versions of the bill would have applied
- directly to on-line communication and information services such as
- internet providers, America On Line, Compuserve, Prodigy etc. H.R. 4922
- would apply directly only to "telecommunications carriers" such as the
- Regional Bell Operating Companies.
-
- But this provision does not narrow the scope of the bill as much
- as it might seem. First, with the new presumption that the government is
- entitled to require private manufacturers to insure its ability to
- wiretap, law enforcement will undoubtedly be back in future years
- insisting that this limitation thwarts its efforts and will seek to
- broaden the coverage to other information providers. Once the basic
- principle of H.R. 4922 is accepted, what arguments remain to resist its
- expansion. The limited application of H.R. 4922 is surely temporary; what
- matters is the basic requirement, not its immediate application.
-
- More importantly, law enforcement will still have the opportunity
- to intercept on-line communications over the internet or commercial
- on-line networks, by tapping into the facilities of the telecommunications
- companies. As critics of the earlier versions had noted the coverage of
- the on-line providers was largely redundant. All these communications
- still pass over telephone lines.
-
- Law enforcement does not need access at every point in a
- telecommunication in order to intercept it. Access at any one point is
- sufficient and that would be readily available since ultimately on-line
- communications must travel over the public switched telephone network
- which the bill requires be wiretap ready.
-
- Moreover, given the commingled nature of digital communication
- lines, it is inevitable that more private information from third parties
- will be intercepted than would be the case with analog phones, and the
- minimization requirements in the bill will not prevent this.
-
- In the end, this proposal will make our telecommunications
- structure more, not less vulnerable.
-
- In its original form the FBI Digital Telephony proposal would have
- given the power to the Attorney General to impose standards on
- communication providers which would guarantee that their systems were
- wiretap-ready.
-
- Essentially, this would have created a centralized wiretapping
- system that threatened the privacy of the entire nation and was dependent
- for its security on a few select people.
-
- This raised the real concern that if electronic communications
- service providers must design their systems to allow and ensure FBI
- access, then the resulting mandatory "back doors" may become known to and
- be exploited by "criminals."
-
- The new proposal contains the same risks. It would have the
- technical standards developed by the industry, through trade associations
- or standard-setting bodies, in consultation with the Attorney General.
- But it contains a "safe harbor" provision, which protects a carrier from
- sanction if it is in compliance with standards created by this approach.
-
- The safe harbor provision virtually guarantees that the standards
- developed through the industry-based process will be adopted by all.
- Whether the standards are directly imposed by government or created by
- concerted industry action, in consultation with the government, makes
- little difference. The result is the same. A centralized wiretapping
- capacity with all of its vulnerabilities will still be created.
-
- Finally, we have grave concerns about the encryption provisions.
- The Edwards/Leahy version has been described as "neutral" on encryption.
- The bill provides that telecommunications providers do not need to decrypt
- data, unless they hold the key.
-
- In the short term, this is an improvement over the earlier
- versions of the bill which would have created obligations to decrypt, but
- there are at least two longer term problems.
-
- First, is the new presumption that industry has the affirmative
- responsibility to create special technical capacity for the government to
- snoop. Can there be any real doubt that the FBI will be back in the years
- to come asserting that its ability to intercept communications has been
- thwarted by easily available encryption and that an industry obligation,
- analogous to the new obligation to provide wiretap capacity, must be
- created.
-
- Secondly, in some cases the telecommunications providers may well
- hold the key -- particularly as they expand the services they provide to
- their customers.
-
- H.R. 4922 proposes a radical and expensive change in our
- telecommunications structure. The threats it poses, now and
- prospectively, are real, but the need for it far less than evident or
- proven. We urge that your Committee not rush into consideration of this
- far reaching measure with so little time left in the session.
-
- We thank you for your consideration of our views and we would be
- happy to sit down with you to discuss these issues.
-
- Sincerely,
-
- Ira Glasser Laura Murphy Lee
-
- =====================
-
- The ACLU urges interested persons to contact the following members of
- Congress immediately:
-
- Rep. Jack BrooksSen. Howard Metzenbaum
- (202) 225-6565 (voice)(202) 224-7494 (voice)
- (202) 225-1584 (fax)(202) 224-5474 (fax)
-
- =============================================================
-
- ACLU Free Reading Room | American Civil Liberties Union
- gopher://aclu.org:6601 | 132 W. 43rd Street, NY, NY 10036
- mailto:infoaclu@aclu.org| "Eternal vigilance is the
- ftp://aclu.org | price of liberty"
-
- ------------------------------
-
- Date: Thu, 22 Sep 1994 08:35:44 GMT
- From: voidstar@NETCOM.COM(Scott Corcoran)
- Subject: File 3--Internet Security Seminar (Nov 12 '94)
-
- INTERNET SECURITY
- SECURE COMMUNICATIONS OVER UNTRUSTED NETWORKS
-
- A one-day seminar on November 12, 1994
- Embarcadero Hyatt Regency Hotel in San Francisco.
-
-
- Methods of achieving authentication, authorization,
- confidentiality, integrity, and nonrepudiation are key to the
- successful realization of the National Information
- Infrastructure (NII). Today's Internet is a proving ground for
- what will become the NII.
-
- The San Francisco Chapter of the IEEE Computer Society has put
- together an outstanding program on encryption, intrusion
- detection, firewalls, architectures, and protocols for Internet
- Security. Speakers in this seminar will describe several of
- the main techniques that exist today and the directions in
- which they are evolving. The seminar will be helpful to
- engineers, engineering managers and product planners seeking
- current knowledge of Internet Security.
-
-
- PROGRAM
-
- 8:30 a.m. Registration opens
-
- 9:00 a.m. Introduction
-
- 9:05 a.m. Keynote Address James Bidzos, President of RSA
-
- 9:45 a.m. Steven Bellovin, Ph.D., Bell Labs
- "Firewalls for Computer Security"
-
- 11:00 a.m. Teresa Lunt, SRI
- "Intrusion Detection"
-
- 11:45 a.m. Round Table Lunch (incl. with registration)
-
- 1:00 p.m. Professor Martin E. Hellman, Ph.D., Stanford
- "Cryptography: The Foundation of Secure Networks"
-
- 2:00 p.m. Dan Nessett, Ph.D.,
- SunSoft and PSRG
- "Future Internet Security Architecture"
-
- 3:00 p.m. Matt Blaze, Ph.D., Bell Labs
- "Protocols: Security Without Firewalls"
-
- 4:00 p.m. "Public Safety vs. Private Liberty"
- A Panel Discussion on the Social
- Implications of Internet Security
- Rex Buddenberg NPS
- Alan McDonald FBI
- Stewart Baker formerly of the NSA
- James Bidzos President of RSA
- Matt Blaze Bell Labs
- Martin Hellman Stanford
-
-
- A one day seminar in San Francisco, on Saturday, November 12th,
- covering private and public-key encryption, key-escrow,
- fire-walls, architecture and protocols for security,
- intrustion detection, and a spirited panel discussion on
- "Public Safety vs. Private Liberty" !
-
- SEATING IS LIMITED. PRE-REGISTER BY OCTOBER 15TH.
-
-
- 9:05 Keynote Address
-
- James Bidzos, President of RSA
-
- James Bidzos, President of RSA Data Security, will present the
- keynote address. Mr. Bidzos heads a company whose encryption
- technologies are licensed for products ranging from computer
- operating systems, to software copy protection, to electronic
- mail, to secure telephones. RSA has licensed several million
- copies of its encryption software, and has become a focal point
- for debate on appropriate application of cryptography.
-
- Mr. Bidzos has gained a unique perspective on the requirements
- of effective cryptographic systems. He will highlight the
- problem of providing strong encryption for users of computer
- networks while meeting the legitimate needs of law enforcement
-
-
- 9:45 Steven Bellovin, Ph.D., Bell Labs
- "Firewalls for Computer Security"
-
- When you connect your computer to the Internet, you also create
- a channel into your computer. Clever vandals, thieves and
- industrial spies have found ways to abuse most of the Internet
- protocols from FTP and Telnet to the World Wide Web and
- Network Time Protocols. Short of pulling the plug, firewalls
- provide the surest defense. The firewall administrator must
- keep abreast of new methods of attack and understand how
- firewalls can mitigate the threat. Steven M. Bellovin, Ph.D.,
- is a senior researcher at AT&T's Bell Laboratories and
- co-author of the well known guide "Firewalls and Internet
- Security: Repelling the Wily Hacker." As one responsible for
- protecting "the phone company" from Internet hackers, Dr. Bellovin
- can describe from firsthand experience how firewalls can be
- constructed to screen them out. Dr. Bellovin will join us in a
- live video teleconference from Bell Laboratories.
-
- 11:00 Teresa Lunt, SRI "Intrusion Detection"
-
- Inevitably, someone will try to breach your firewall and might
- succeed. The time it takes you to discover the intrusion and
- catch the culprit depends on the event logging you have
- established. However, logging the many different transactions
- that might expose trespassing produces mountains of data.
- Automatic digestion of the logs is the only hope of monitoring
- them all. Teresa F. Lunt, Director of Secure Systems Research
- at SRI's Computer Systems Laboratory, directs work in
- multilevel database systems and intrusion detection. Ms. Lunt
- will describe intrusion detection and demonstrate automated
- tools developed at SRI to analyze audit data for suspicious
- behavior.
-
- 1:00 Professor Martin E. Hellman, Ph.D., Stanford
- "Cryptography: The Foundation of Secure Networks"
-
- Data in transit across unsecured networks like the Internet
- are subject to wiretapping attacks and impersonation.
- Moreover, privacy of communication and authentication of the
- sender's message are essential to Internet commerce, with
- exchange of contracts, receipts, credit card drafts and the
- like increasingly commonplace. Encryption can solve some of
- these problems, but what kind of encryption? Authentication
- only or encrypted messages? Secret key or public key, or
- both? Will you need a giant key ring for mes sage keys,
- session keys, file keys, and passwords? Martin E. Hellman,
- Ph.D., Professor of Electrical Engineering at Stanford
- University, is co-inventor of public key cryptography with
- Whitfield Diffie and Ralph Merkle. He was elected a Fellow of
- the IEEE for contributions to cryptography. Dr. Hellman will
- explore threats to communication and costs of electronic
- countermeasures. He will explain the importance and means of
- authenticating electronic messages, and he will survey public key
- cryptography. Dr. Hellman will describe public key techniques
- including Rivest-Shamir-Adleman (RSA), Diffie-Hellman, ElGamal
- and Digital Signature Standard (DSS). He will also describe
- the current status of export control and encryption standards
- such as the Data Encryption Standard (DES), Escrowed
- Encryption Standard (EES) and its encryption algorithm,
- Skipjack, which is implemented in Clipper and Capstone chips.
-
- 2:00 Dan Nessett, Ph.D., SunSoft and PSRG
- "Future Internet Security Architecture"
-
- Dan Nessett, Ph.D., of the SunSoft Division of Sun
- Microsystems, and until recently with Lawrence Livermore
- National Laboratory, has worked extensively in local area
- networks, distributed operating systems and distributed systems
- security. He is a member of the Privacy and Security Research
- Group (PSRG), which is convened under the auspices of the
- Internet Society. Dr. Nessett will explain the emerging
- Internet security architecture work undertaken by the PSRG.
- The architecture will guide the development of security
- mechanisms used in Internet standards.
-
-
- 3:00 Matt Blaze, Ph.D., Bell Labs
- "Protocols: Security Without Firewalls"
-
- We use firewalls because Internet protocols are not inherently
- secure. Can we rehabilitate the Internet protocols to produce
- protocols which are secure, not computationally prohibitive,
- and compatible with existing protocols? Matt Blaze, Ph.D., of
- Bell Laboratories will talk about the problems of integrating
- cryptographic protection into large-scale network infrastructure.
- Dr. Blaze is the author of "A Cryptographic
- File System for Unix," presented at the 1993 ACM Conference on
- Communications and Computer Security, and co-author with John
- Ioann idis of "The Architecture and Implementation of
- Network-Layer Security Under UNIX," which describes "swIPe," a
- network-layer security protocol for the IP protocol suite.
- Dr. Blaze will address issues concerning network security
- protoc ols, key management and distribution, and threats and
- models for cryptographic engineering.
-
- 4:00 A Panel Discussion on the Social Implications of
- Internet Security "Public Safety vs. Private Liberty"
-
- At one end of an imagined security spectrum lies the
- information police-state. Through traffic analysis,
- mandatory personal ID numbers and escrowed encryption, and
- the ability to record all messages and commerce carried out
- on the Information Superhighway, governments could maintain
- dossiers on every aspect of the personal life and business
- of its citizens. Privacy advocates fear that a corrupt government
- could use such information against its political enemies and to
- subvert personal freedoms. At the other extreme lies information
- anarchy. Through the use of digital cash, anonymous remailers,
- and strong non-escrowed encryption, the Information
- Superhighway could become a hide-out for criminals and
- national security threats. The potential for black-market
- activity and the associated tax-evasion is so enormous that
- some have speculated that governments could eventually
- collapse. Law-enforcem ent advocates fear that they will be
- unable to keep up with criminals and terrorists who ply their
- trade electronically. Our distinguished panel will provide
- insight into the interplay between the rights of individuals
- to privacy and freedom, the rights of companies to conduct
- unrestrained trade, and the ability of law enforcement and
- security agencies to perform their functions efficiently.
- This conclusion to the seminar will put into perspective
- the social changes that might be wrought by the technical
- advances discussed earlier in the day.
-
- Panelists include:
-
- Rex Buddenberg NPS
- Alan McDonald FBI
- Stewart Baker formerly of the NSA
- James Bidzos President of RSA
- Matt Blaze Bell Labs
- Martin Hellman Stanford
-
- Rex Buddenberg, Instructor of information systems architecture
- and applied networking at the Naval Postgraduate School, will
- moderate the panel. Mr. Buddenberg is a maritime command,
- communication, control and intelligence (C3I) consultant and a
- computer networking author. As a C3I architect for the U.S.
- Coast Guard, he developed plans and specifications for
- extending Internet connectivity to oceanographic ships. Mr.
- Buddenberg contemplates the means and effects of net warfare as
- both the good guys and bad guys share the same network.
-
- Alan McDonald, Special Counsel for Electronic Surveillance Matters,
- Information Resources Division, Federal Bureau of Investigation,
- is a specialist in the law and policy concerning electronic
- surveillance, Digital Telephony, and encryption issues.
- He frequently represents the FBI's view of law enforcement equities
- in light of advanced telecommunications and encryption.
-
- Stewart Baker is a former General Counsel to the NSA and
- a partner in Steptoe & Johnson, a Washington, DC law firm.
- His expertise is in telecommunications, computer export policy,
- security of national information infrastructure and encryption.
- Mr. Baker brings direct experience with the problem that strong
- encryption creates for the NSA in protecting our national
- security.
-
-
- QUESTIONS? CALL (415)-327-6622.
-
- Cut-off and complete this form, enclose your check payable to
- the IEEE SFCS, and mail to: IEEE Council Office 701 Welch
- Rd. #2205 Palo Alto, CA. 94304
-
- To qualify for the reduced Pre-registration fees, your
- application with check must be postmarked no later than Oct.
- 15, 1994. Registration fee includes lunch, refreshments, and
- parking. Seating is limited. To make sure the seminar is
- not sold out, call (415) 327-6622.
-
- please check the appropriate box
-
- Fees on or before Oct. 15th:
-
- ___ IEEE Member $ 110
- ___ Non-member $ 120
- ___ Student $ 85
-
- Fees after Oct. 15th:
- ___ IEEE Member $ 125
- ___ Non-member $ 145
- ___ Student $ 100 (students must present ID)
-
-
- The seminar location is the Hyatt Regency Embarcadero Hotel,
- near the Ferry Building, in San Francisco.
- Your registration fee includes the all day seminar, lunch,
- and convenient parking in the garages underneath adjacent
- Embarcadero Centers 1, 2, or 3. (Keep your ticket for validation).
-
-
- Please print clearly:
-
- Name : __________________________________________
-
- Title : __________________________________________
-
- Company: __________________________________________
-
- Address: __________________________________________
-
- __________________________________________
-
- _______________________________ ___ ______
-
- Day phone #:(___)_____-_______
-
- IEEE member (or affiliate) #:_______ ____ (for discount)
-
- College/University (if student):___________________
-
- ___ Vegetarian lunch option
-
-
- Refunds will be honored through October 22nd, substitutions
- any time. Additional information can be obtained by telephoning
- the IEEE Bay Area Council Office: (415)327-6622.
-
- IEEE SFCS RESERVES THE RIGHT TO MAKE CHANGES TO THE SEMINAR
-
- Sponsored by the San Francisco Chapter of the IEEE Computer
- Society. The IEEE is a non-profit organization.
-
- ------------------------------
-
- Date: Sun, 25 Sep 1994 20:28:58 -0400
- From: eye@IO.ORG(eye WEEKLY)
- Subject: File 4--Police, Press, and Porn in Toronto
-
-
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- eye WEEKLY September 22 1994
- Toronto's arts newspaper .....free every Thursday
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~
- EYE NET EYE NET
-
- PRESS, POLICE AND PORN REVISITED
-
- by
- K.K. CAMPBELL
-
-
- Once again, the news media finds itself being used to misrepresent
- the nature of the net for the Big Story about the 3Ps -- Pedophilia,
- Pornography or Piracy.
-
- On Sept. 13, CITY-TV's CityPulse News did a story about "Mr.
- Concerned Citizen," who is worried children can access hardcore
- porn on the net through a system called called Interlog. Mr.
- Concerned Citizen is Bruce Lloyd of Agincourt, who filed a complaint
- with Metro Police Chief William McCormack against Interlog.
-
- We also met Interlog owner Matt Harrop (mharrop@interlog.com), a
- 19-year-old with dyed-purple hair. It's the sort of juxtaposition of
- images that the camera loves: Mr. Concerned-Citizen-Who-Loves-
- Children versus Freaky-Haired Porn-Peddler.
-
- But that's not quite the whole story.
-
- It turns out Lloyd is himself a writer of copious vile material. Lloyd
- had not counted on some elements of the news media discovering his
- net.history. (Joe Baptista, a friend of Lloyd's, similarly suckered
- CITY news in January with the fake story that the Ontario
- government computers held banned Karla Homolka newstories in
- them.)
-
- In fact, as this column will demonstrate, Lloyd's complaint issues
- from a personal vendetta against Harrop.
-
- Sysadmins, take note.
-
- LLOYD IN ACTION
-
- Let's review some of Lloyd's posting habits. It all seems to have
- started around Aug. 21, when Lloyd entered into a flamewar with
- rabid homophobe Chuck Whealton (chuck@hopi.dtcc.edu).
-
- * Lloyd began mailbombing Whealton's site, a definite no-no.
-
- * Lloyd soon claimed he'd found out where Whealton lives and that he
- and friends would drive down to Delaware and gang rape Whealton: "I
- can't wait to have sex with him ... maybe we could do it at the same
- time! I bet he's never had two guys up his ass at once before!"
-
- * Lloyd has the curious distinction of being even more hated by most
- online gays than brain-dead homophobes like Whealton. Quotes from
- his public posts afford a glimpse into why. Lloyd wrote some
- interesting posts to lesbian netters: "You just can't leave me alone
- ... Enjoy being a failure, Cuntlicker." "Perchance a rigorous butt-fuck
- is what you need to loosen up, Cuntrag?"
-
- In a phone interview, Lloyd admitted to eye he wrote these remarks
- -- in fact, he giggled when admitting to them. "Well, you know, I
- was trying to be insulting."
-
- * His interest in protecting children from porn is also clear from
- this Usenet post: "I love straight fuckers like this. What they really
- need is to have their dicks tied up in leather straps and then have
- needles pierced right through them."
-
- * On the "pornography" front, Lloyd sent a very detailed post called
- "How To Suck A Penis" to newsgroups accessible by children. (He did
- not write it, just distributed it.)
-
- "If Mr. Lloyd is so concerned about children being allowed on this
- network, why was he contributing his own obscene material?" asks
- Ken Weaverling (weave@dtcc.edu), manager of computer services at
- Stanton/Wilmington Campuses of Delaware Technical & Community
- College -- the site that has Whealton as a user.
-
- For a fuller archive of Lloyd's public Usenet posts, use anonymous
- FTP to hopi.dtcc.edu in directory ~ftp/interlog.
-
- To experienced netters, these quotes from Lloyd's net.writings
- aren't that shocking and are dismissed as immature attempts to
- shock. They are really just his way of "turning up the heat" in this
- medium.
-
- But they become important to prove Lloyd's motives when he lays a
- complaint with the chief of police.
-
- HARROP IN ACTION
-
- Other netters had long been complaining about Lloyd to sysadmin
- Harrop. After the rape threat, Harrop asked Lloyd to tone it down.
-
- "I informed him his account would be terminated if he kept it up,"
- Harrop said. "At this point, he attempted to blackmail me. He said
- he'd go to the police with obscenity charges against Interlog if he
- was removed."
-
- Reading that, Harrop said enough was enough and wrote Lloyd email
- that his account was history.
-
- Lloyd was permitted a farewell letter, which Harrop would use as
- proof Lloyd had read the termination notice. It begins: "Matt, I'll let
- you know that you've pissed me off. You've wasted a lot of your time
- and energy on nothing. I encouraged a lot of people to use your
- system. Now, they will not. I am very sorry, Matt, it sounds like you
- are going to lose a lot more than just me as a user. You are also
- going to lose Apple as a customer."
-
- (When eye called Apple, a spokesperson emphatically denied that
- Lloyd is an actual Apple employee. He is a subcontracted phone-tech
- support staffer -- he answers questions from Mac users who forget
- where the "on" switch is.)
-
- Lloyd again made the police threat: "I might mention that I am
- thinking of going to the police anyway. You are carrying highly
- illegal material on your system. Pornographic and obscene material.
- You are directly responsible for this."
-
- The next day (Sept. 13), Lloyd faxed media a release entitled "Metro
- Police To Investigate Obscenity Charges Against Toronto Internet
- Service Provider" -- before the police had even read the complaint.
-
- Lloyd told eye it's strictly coincidence his complaint came the day
- after he was kicked off Interlog. Most netters don't buy Lloyd's story
- for a second. But they worry that unless press and/or police get
- savvy to how the Internet works, anyone with a grudge will be able
- to do what Lloyd did.
-
- Meanwhile, the real victim in all this is business owner Matt Harrop
- and Interlog, portrayed by a gullible mainstream media outlet as
- purveyors of porn to children.
-
-
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Press Release
-
- For More Information, Call:
-
- Bruce Lloyd
- Telephone: (416) 297-1742
-
- METRO POLICE TO INVESTIGATE OBSCENITY CHARGES AGAINST
- TORONTO INTERNET SERVICE PROVIDER
-
- Metropolitan Toronto Police have been asked to investigate obscenity
- charges against INTERLOG INTERNET SERVICES, and Internet service
- provider operating from 1235 Bay Street, Suite 400, Toronto. (A copy of
- the complaint to Metro Police is attached).
-
- The complain stems from my discovery of obscene materials on the
- computer system of Interlog. The materials include: sexually graphic
- texts, pictures involving bestiality, and other pictures showing both
- women and men in degrading and obscene activity. Such material would
- clearly be in contravention of Canadian law.
-
- The obscene material in question is distributed via the Internet: A
- world-wide computer network, often referred to as "The Information
- Superhighway". The material is received by Interlog, from computer
- users around the world, and held on a hard disk drive at the Bay Street
- address.
-
- Anyone willing to pay Interlog9s membership fee of $22.50/month can
- access the information. Of particular concern is the fact that
- children have full access to this information -- As Interlog requires
- no proof of age or identification when registering.
-
- This will be an interesting case in law: The decision of Metro
- Police and the Crown Attorney to pursue or not to pursue charges in
- this matter, will have repercussions for Ontarian's with regard to what
- information they will be able to access, in the future, on the
- Information Superhighway. Further, the actions of the authorities in
- this matter may help establish the status of Internet Service Providers
- as "common carriers" (like Canada Post or Bell Canada), or not.
-
- * * * * *
-
- September 13, 1994
-
- FAX
-
- Chief William McCormack
- Metropolitan Toronto Police
- 40 College Street
- Toronto, ON
-
- Dear Chief McCormack:
-
- Please accept this correspondence as my official request for you to
- commence an investigation into the operations and practices of Interlog
- Internet Services (Interlog). Interlog is an Internet service
- provider, operated from 1235 Bay Street, Suite 400, Toronto, (416)
- 975.2655 (voice), (416) 532.5015 (fax), (416) 515.1414 (data) my Mr.
- Matt Harrop.
-
- As you may be aware, the Internet is a world-wide computer network. At
- present, approximately 20 million people have some form of access to
- the Internet; and approximately 300,000 information databases are
- available to users. Part of the Internet consists of Usenet. Usenet
- is a forum of "newsgroups", which provide for the exchange of
- information on a variety of topic specific areas. Of particular
- concern to me, in relation to this complain, are the
- "alt.binaries.pictures" hierarchy of newsgroups. One of these
- newsgroups is "alt.pictures.binaries.tasteless". In this newsgroups, I
- have found pictures which I consider to be pornographic and obscene,
- and in contravention of Canadian Law.
-
- Interlog Internet Services provides access to these newsgroups to
- anyone who is willing to pay their fee of $22.50/month. The procedure
- for obtaining an account with Interlog consists of mailing a cheque
- along with a completed and signed registration form. I have attached
- copy of the registration form, for your information. You will notice
- that it is not necessary to submit identification with this form:
- This, I am further concerned by the fact that children could easily
- register and access the obscene material contained in
- alt.binaries.pictures.tasteless.
-
- The information contained in alt.binaries.pictures.tasteless, and other
- newsgroups (including ones dealing with the Homolka publication ban,
- and many sexually explicit groups), is downloaded by Mr. Harrop of
- Interlog. It is then held on his computer system, and accessed by his
- registered users.
-
- Chief McCormack, at this time I ask that you undertake to investigate
- the information which is contained on the computer systems of Interlog
- Internet Services. Further I would expect that you would seek judicial
- authorization to seize any equipment found to contain obscene
- materials, and shut the service down. Lastly, I would ask that you
- pursue criminal charges in this matter, should your investigations
- determine that in fact Mr. Harrop is storing and transmitting obscene
- materials.
-
- Thank you for your time and attention to this matter. I will look
- forward to speaking with your investigators at the earliest
- opportunity, in order to provide any further information that may be
- required.
-
- Sincerely,
-
- Bruce M. Lloyd
- 30 Thunder Grove, Suite 1612,
- Agincourt, Ontario, M1V 4A3
- (416) 297-1742
-
- ------------------------------
-
- Date: Thu, 22 Sep 1994 15:15: 06 EDT
- From: steven.horn@f1.n3409.z1.fidonet.org
- Subject: File 5--Canadian BBS Sysops Plead Guilty to "Piracy"
-
- * Copied (from: CAN_SYSLAW) by Steven Horn using timEd 1.01.g2+.
-
- Hello All!
-
- The following story appeared in Wednesday's The Globe and Mail Report on
- Business (Sept. 21, 1994, National edition, p. 5):
-
- "Two bulletin board operators in Montreal and Toronto recently
- pleaded guilty to the illegal distribution of software and were fined
- a total of $22,500.
-
- 'This sends an important message that software piracy in Canada
- will not be tolerated -- at any level,' said Frank Clegg, president
- of the Canadian Alliance Against Software Theft, which announced the
- convictions yesterday.
-
- In August, the RCMP raided a Montreal bulletin board system (BBS)
- known as 90 North, revealing the distribution of unlicenced software
- by Lotus, Microsoft, Novell and Novell/WordPerfect Applications
- Group. Its operator, Michael Solomon, was fined $20,000.
-
- In September, Sergio Arana, operator of Toronto-based Legion of
- Death, was fined $2,500 after investigators infiltrated his BBS and
- downloaded sufficient software to confirm illegal activity."
-
- There's nothing I can add.
-
- ------------------------------
-
- Date: Thu, 22 Sep 94 14:25 CDT
- From: rejones@MHGJRS.MHG.COM
- Subject: File 6--PHRACK hardcopies available from SotMESC / GCMS
-
- Press Release
-
- The SotMESC is presenting three volumes of the collected
- works from Phrack in a bounded treasury. These collectors
- items can be obtained from the non-profit SotMESC organization.
- Phrack 1-42 (c) SotMESC are being offered to the public to
- fund our organization in protecting network liberties, freedom
- and privacy.
-
- The Phrack volumes and other assorted fundings we are
- publishing can be found in our current catalog available for
- $1 via Smail at: SotMESC, Box 573, Long Beach, Ms 39560.
-
- More information on the SotMESC can be obtained by
- pointed to http://www.phantom.com/~king with Mosaic.
-
- ------------------------------
-
- Date: Sat, 24 Sep 1994 12:47:15 -0500
- From: "William B. Collins" <bcollins@FALCON.CC.UKANS.EDU>
- Subject: File 7--ACLU Gopher
-
- Point your gophers to aclu.org:6601/11/ for access to the ACLU Free
- Reading Room. The following document is from the ACLU Gopher. It is also
- available through the World Wide Web.
-
- =======================
- THE ACLU FREE READING ROOM
-
- Welcome to the American Civil Liberties Union Free Reading Room,
- a publications, software, and information resource of the
- nation's oldest and largest defender of the principles set forth
- in the Bill of Rights.
-
- The ACLU Free Reading Room makes available to users of the
- internet a growing collection of our publications and information
- resources. Currently, the collection includes our basic line
- of publications on issues of high public interest; the current issue
- of our membership newsletter, Civil Liberties; a growing collection of
- recent public policy reports and action guides; Congressional voting
- records for the 103rd Congress; and an archive of news releases from the
- National Office.
-
- The collection will grow to include calls to action on legislative
- issues, testimony delivered to Congress, and a collection of ACLU legal
- briefs submitted in important Supreme Court cases.
-
- In the future, we plan to develop a variety of electronic
- publications, including an adaptation of our newsletter and other
- special interest mailing lists. Please watch this space for
- further information.
-
- ADMINISTRATIVE INFORMATION
-
- The ACLU Free Reading Room is a project of the Public Education
- Department of the National Office of the American Civil Liberties
- Union. Programming services are provided by The Pipeline
- Network, an Internet access provider based in New York.
-
- The ACLU Free Reading Room contains publications and other
- materials from the ACLU in a gopher and ftp accessible resource,
- and is a read-only site. At this time, we recommend that
- follow-ups and public discussion of the materials at this site
- take place in the USENET news group alt.society.civil-liberties,
- alt.censorship or other newsgroups or bulletin boards where
- appropriate. Comments and questions about this resource may be
- directed to infoaclu@aclu.org.
-
- Unless otherwise indicated, documents in this resource may be
- circulated in whole with acknowledgement, and may of course be
- quoted under fair use guidelines. Print reproduction other than
- for personal use should be requested from infoaclu@aclu.org, or
- by mail at this address: American Civil Liberties Union, Department of
- Public Education, 132 West 43rd Street, New York, New York 10036
-
- Consulting this resource is not a means of obtaining legal advice
- or representation from the ACLU. For information about seeking
- assistance from the ACLU, consult section 10 of this gopher. At this
- time, we do not have the capacity to forward electronic mail to our state
- offices, who are responsible for reviewing legal complaints
- arising in their areas and offering legal assistance. Therefore,
- requests for legal assistance sent to infoaclu@aclu.org cannot be
- accepted.
-
- ------------------------------
-
- Date: Mon, 26 Sep 1994 12:17:02 CDT
- From: Vigdor Schreibman - FINS <fins@ACCESS.DIGEX.NET>
- Subject: File 8--Telecommunication Reform Bill (S. 1822) DEAD!
-
- FINS SPECIAL REPORT September 23, 1994
-
- S. 1822 DEAD!
- Hollings Throws In The Towel
-
- Washington, DC, Sept 23, 1994--Sen. Ernest F. Hollings (D-SC), announced
- today that "we will be unable to pass comprehensive telecommunications
- reform legislation this Congress." Hollings noted that "only one sector
- of the industry continues to oppose the bill . . . the telephone
- companies, and especially, the RBOCs." Moreover, Hollings listed a
- serious of reasons that would make passage of the bill "impossible this
- Congress." This included (among others reasons), the fact that "the
- RBOCs have violated the terms of the agreement they have reached with
- me and the other members of the committee on long distance" as well as
- an ultimatum delivered by Sen. Dole. Dole informed the Committee
- yesterday that a serious of revisions of the bill, were required,
- which were "non-negotiable." The provisions would have "substantially
- deregulated the industry" according to Hollings.
-
- ------------------------------
-
- Date: Thu, 13 Aug 1994 22:51:01 CDT
- From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: File 9--Cu Digest Header Information (unchanged since 10 Sept 1994)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
- In BELGIUM: Virtual Access BBS: +32.69.45.51.77 (ringdown)
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #6.85
-