home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Wed Feb 15, 1995 Volume 7 : Issue 13
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Retiring Shadow Archivist: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Copy Ediotr: Ettie-Ann Shrdlu
-
- CONTENTS, #7.13 (Wed, Feb 15, 1995)
-
- File 1--FBI Press Release in re Kevin Mitnick
- File 2--Kevin Mitnick Apprehended (NYT Excerpt) (fwd)
- File 3--Senate Bill 314 - "Communications Decent Act of 1995"
- File 4--Re: Senate Bill 314: Electronic Monitoring (fwd)
- File 5--Cu Digest Header Information (unchanged since 25 Nov 1994)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ----------------------------------------------------------------------
-
- Date: Thu, 16 Feb 1995 22:36:02 -0600
- From: jthomas2@SUN.SOCI.NIU.EDU(Jim Thomas)
- Subject: File 1--FBI Press Release in re Kevin Mitnick
-
- FBI PRESS RELEASE (Feb 15, 1995)
-
- At 1:30 a.m., today, February 15, 1995, agents of the FBI
- arrested KEVIN MITNICK, a well-known computer hacker and federal
- fugitive. The arrest occurred after an intensive two-weak electronic
- manhunt led law enforcement agents to MITNICK's apartment in Raleigh,
- North Carolina.
-
- MITNICK, 31, was convicted by Federal authorities in 1988 in
- Los Angeles for stealing computer programs and breaking into
- corporate networks.
-
- He received a one-year sentence in that case, and a Federal warrant
- was issued following MITNICK's violation of probation.
-
- In this latest incident, MITNICK is alleged to have
- electronically attacked numerous corporate and communications carriers
- located in California, Colorado, and North Carolina where he caused
- significant damage and stole proprietary information. One of the
- attacked sites was the San Diego Supercomputer Center (SDSC), and
- Tsutomu Shimomura, a system administrator at SDSC, provided
- significant assistance to law enforcement personnel during the
- investigation. MITNICK is also under investigation by state law
- enforcement authorities in Seattle for separate activities there.
-
- As is typical in such interstate computer cases, may FBI
- offices and United States Attorneys' Offices have carefully
- coordinated their efforts. These offices include the FBI's Nation al
- Computer Crime Squad at the Washington Metropolitan Field Office, as
- well as FBI and United States Attorneys' Offices in the Eastern
- District of North Carolina (Raleigh), the Central District of North
- Carolina (Greensboro), the Southern District of California (San
- Diego), the Central District of California (Los Angeles), the Northern
- District of California (San Francisco), and the District of Colorado.
- Legal and technical assistance is also being provided by the
- Criminal Division's Computer Crime Unit in Washington, D. C.
-
- On February 15, 1995, a complaint was filed in U. S. District
- Court, Raleigh, N. C., charging KEVIN MITNICK with violation of 18 U.
- S. Code, Section 1029 (Fraud and Related Activity in Connection With
- Access Devices) in violation Title 18, Section 1038 (Fraud and Related
- Activities in Connection with Computers).
-
- ------------------------------
-
- Date: Thu, 16 Feb 1995 22:33:50 -0600
- From: jthomas2@SUN.SOCI.NIU.EDU(Jim Thomas)
- Subject: File 2--Kevin Mitnick Apprehended (NYT Excerpt) (fwd)
-
- HOW A COMPUTER SLEUTH TRACED A DIGITAL TRAIL
-
- (c) Copyright the News & Observer Publishing Co.
-
- New York Times, Feb 16
-
- RALEIGH, N.C. (8.59 p.m.) -- It takes a computer hacker to catch one.
-
- And if, as federal authorities contend, 31-year-old computer outlaw
- Kevin D. Mitnick is the person behind a recent spree of break-ins to
- dozens of corporate, university and personal computers on the global
- Internet, his biggest mistake was raising the interest and ire of
- Tsutomu Shimomura.
-
- Shimomura, who is 30, is a computational physicist with a reputation
- as a brilliant cyber-sleuth in the tightly knit community of
- programmers and engineers who defend the country's computer
- networks.
-
- And it was Shimomura who raised the alarm in the Internet world
- after someone used sophisticated hacking techniques on Christmas
- Day to remotely break into the computers he keeps in his beach
- cottage near San Diego and steal thousands of his data files.
-
- Almost from the moment Shimomura discovered the intrusion, he made it
- his business to use his own considerable hacking skills to aid the
- FBI's inquiry into the crime spree.
-
- He set up stealth monitoring posts, and each night over the last few
- weeks, Shimomura used software of his own devising to track the
- intruder, who was prowling around the Internet. The activity usually
- began around mid-afternoon, Eastern time, broke off in the early
- evening, then resumed shortly after midnight and continued through
- dawn.
-
- Shimomura's monitoring efforts enabled investigators to watch as the
- intruder commandeered telephone company switching centers, stole
- computer files from Motorola, Apple Computer and other companies, and
- copied 20,000 credit-card account numbers from a commercial computer
- network used by some of the computer world's wealthiest and
- technically savviest people.
-
- And it was Shimomura who concluded last Saturday that the intruder
- was probably Mitnick, whose whereabouts had been unknown since
- November 1992, and that he was operating from a cellular telephone
- network in Raleigh, N.C.
-
- ((Story describes 48 hour stake-out))
-
- A COMPUTER SLEUTH BECOMES A VICTIM
-
- On Christmas Day, Tsutomu Shimomura was in San Francisco, preparing to
- make the four-hour drive to the Sierra Nevadas, where he spends most
- of each winter as a volunteer on the cross-country ski patrol near
- Lake Tahoe.
-
- ((Story describes Christmas computer intrusion and taunting))
-
- By masquerading as a familiar computer, an attacker can gain access to
- protected computer resources and seize control of an otherwise
- well-defended system. In this case, the attack had been started from a
- commandeered computer at Loyola University of Chicago.
-
- Though the vandal was deft enough to gain control of Shimomura's
- computers, he, she or they had made a clumsy error. One of Shimomura's
- machines routinely mailed a copy of several record-keeping files to a
- safe computer elsewhere on the network -- a fact that the intruder did
- not notice.
-
- That led to an automatic warning to employees of the San Diego
- Supercomputer Center that an attack was under way. This allowed the
- center's staff to throw the burglar off the system, and it later
- allowed Shimomura to reconstruct the attack.
-
- ((The story describes Shmoura's respected credentials in
- computer-security circles)
-
- WATCHING AN ATTACK FROM A BACK ROOM
-
- The first significant break in the case came on Jan. 28, after Bruce
- Koball, a computer programmer in Berkeley, Calif., read a newspaper
- account detailing the attack on Shimomura's computer.
-
- The day before, Koball had received a puzzling message from the
- managers of a commercial on-line service called the Well, in
- Sausalito. Koball is an organizer for a public-policy group called
- Computers, Freedom and Privacy, and the Well officials told him that
- the group's directory of network files was taking up millions of bytes
- of storage space, far more than the group was authorized to use.
-
- ((The story indicates that Koball found that odd, notified Well
- officials, and the Well officials eventually called Shimoura, who
- recruited to colleagues, Andrew Gross and Julia Menapace, to help
- him))
-
- ((The story adds that the Well personnel set up a monitoring
- system))
-
- Though the identity of the attacker or attackers was unknown, within
- days a profile emerged that seemed increasingly to fit a well-known
- computer outlaw: Kevin D. Mitnick, who had been convicted in 1989 of
- stealing software from Digital Equipment Corp.
-
- Among the programs found at the Well and at stashes elsewhere on the
- Internet was the software that controls the operations of cellular
- telephones made by Motorola, NEC, Nokia, Novatel, Oki, Qualcomm and
- other manufacturers. That would be consistent with the kind of
- information of interest to Mitnick, who had first made his reputation
- by hacking into telephone networks.
-
- ((The story notes that the intruder obtained Motorola security
- software)
-
- But one brazen act helped investigators. Shimomura's team, aided by
- Mark Seiden, an expert in computer fire walls, discovered that someone
- had obtained a copy of the credit-card numbers for 20,000 members of
- Netcom Communications Inc., a service based in San Jose that provides
- Internet access.
-
- ((According to the story, the monitoring team shifted operations
- to San Jose and Netcom to obtain a better vantage point))
-
- Late last week, FBI surveillance agents in Los Angeles were almost
- certain that the intruder was operating somewhere in Colorado. Yet
- calls were also coming into the system from Minneapolis and Raleigh.
-
- The big break came late last Saturday night in San Jose, as Shimomura
- and Gross, red-eyed from a 36-hour monitoring session, were eating
- pizza. Subpoenas issued by Kent Walker, the U.S. assistant attorney
- general in San Francisco, had begun to yield results from telephone
- company calling records.
-
- And now came data from Walker showing that telephone calls had been
- placed to Netcom's dial-in phone bank in Raleigh through a cellular
- telephone modem.
-
- The calls were moving through a local switching office operated by GTE
- Corp. But GTE's records showed that the calls had looped through a
- nearby cellular phone switch operated by Sprint.
-
- Because of someone's clever manipulation of the network software, the
- GTE switch thought that the call had come from the Sprint switch, and
- the Sprint switch thought that the call had come from GTE. Neither
- company had a record identifying the cellular phone.
-
- When Shimomura called the number in Raleigh, he could hear it looping
- around endlessly with a "clunk, clunk" sound. He called a Sprint
- technician in Raleigh and spent five hours comparing Sprint's calling
- records with the Netcom log-ins. It was nearly dawn in San Jose when
- they determined that the cellular phone calls were being placed from
- near the Raleigh-Durham International Airport.
-
- ((Shimora, according to the story, rode around Raleigh with a Sprint
- technician, honed in on the caller by measuring signal-strength))
-
- At that point, it was time for law-enforcement officials to take over.
- At 10 p.m. Monday, an FBI surveillance team arrived from Quantico, Va.
-
- In order to obtain a search warrant it was necessary to determine a
- precise apartment address. And although Shimomura had found the
- apartment complex, pinning down the apartment was difficult because
- the cellular signals were creating a radio echo from an adjacent
- building. The FBI team set off with its own gear, driven by the Sprint
- technician, who this time was using his family van.
-
- On Tuesday evening, the agents had an address -- Apartment 202 -- and
- at 8:30 p.m. a federal judge in Raleigh issued the warrant from his
- home. At 2 a.m. Wednesday, while a cold rain fell in Raleigh, FBI
- agents knocked on the door of Apartment 202.
-
- said he was on the phone with his lawyer. But when an agent took the
- receiver, the line went dead.
- ((The story concludes by describing that it took Mitnick more
- than five minutes to open the door, and when he did, Mitnick claimed
- that he was on the phone with his lawyer)).
-
- ------------------------------
-
- Date: Thu, 9 Feb 1995 23:49:02 -0600
- From: jim thomas <tk0jut1@CS.NIU.EDU>
- Subject: File 3--Senate Bill 314 - "Communications Decent Act of 1995"
-
- (Obtained from gopher.eff.org)
-
- Senate Bill: S 314
- S 314 IS
- 104th CONGRESS
- 1st Session
- To protect the public from the misuse of the telecommunications
- network and telecommunications devices and facilities.
- IN THE SENATE OF THE UNITED STATES
- February 1 (legislative day, January 30), 1995
- Mr. Exon (for himself and Mr. Gorton) introduced the following
- bill; which was read twice and referred to the Committee on
- Commerce, Science, and Transportation
- A BILL
- To protect the public from the misuse of the telecommunications
- network and telecommunications devices and facilities.
- Be it enacted by the Senate and House of Representatives of the
- United States of America in Congress assembled,
- SECTION 1. SHORT TITLE.
- This Act may be cited as the `Communications Decency Act of 1995'.
- SEC. 2. OBSCENE OR HARASSING USE OF TELECOMMUNICATIONS FACILITIES
- UNDER THE COMMUNICATIONS ACT OF 1934.
- (a) Offenses: Section 223 of the Communications Act of 1934 (47
- U.S.C. 223) is amended--
- (1) in subsection (a)(1)--
- (A) by striking out `telephone' in the matter above
- subparagraph (A) and inserting `telecommunications device';
- (B) by striking out `makes any comment, request,
- suggestion, or proposal' in subparagraph (A) and inserting
- `makes, transmits, or otherwise makes available any
- comment, request, suggestion, proposal, image, or other
- communication';
- (C) by striking out subparagraph (B) and inserting the
- following:
- `(B) makes a telephone call or utilizes a
- telecommunications device, whether or not conversation or
- communications ensues, without disclosing his identity and
- with intent to annoy, abuse, threaten, or harass any person
- at the called number or who receives the communication;' and
- (D) by striking out subparagraph (D) and inserting the
- following:
- `(D) makes repeated telephone calls or repeatedly
- initiates communication with a telecommunications device,
- during which conversation or communication ensues, solely
- to harass any person at the called number or who receives
- the communication; or';
- (2) in subsection (a)(2), by striking `telephone facility'
- and inserting `telecommunications facility';
- (3) in subsection (b)(1)--
- (A) in subparagraph (A)--
- (i) by striking `telephone' and inserting
- `telecommunications device'; and
- (ii) inserting `or initiated the communication' and
- `placed the call', and
- (B) in subparagraph (B), by striking `telephone facility'
- and inserting `telecommunications facility'; and
- (4) in subsection (b)(2)--
- (A) in subparagraph (A)--
- (i) by striking `by means of telephone, makes' and
- inserting `by means of telephone or telecommunications
- device, makes, knowingly transmits, or knowingly makes
- available'; and
- (ii) by inserting `or initiated the communication'
- after `placed the call'; and
- (B) in subparagraph (B), by striking `telephone facility'
- and inserting in lieu thereof `telecommunications facility'.
- (b) Penalties: Section 223 of such Act (47 U.S.C. 223) is amended--
- (1) by striking out `$50,000' each place it appears and
- inserting `$100,000'; and
- (2) by striking `six months' each place it appears and
- inserting `2 years'.
- (c) Prohibition on Provision of Access: Subsection (c)(1) of such
- section (47 U.S.C. 223(c)) is amended by striking `telephone' and
- inserting `telecommunications device.'
- (d) Conforming Amendment: The section heading for such section is
- amended to read as follows:
- `obscene or harassing utilization of telecommunications devices and
- facilities in the district of columbia or in interstate or foreign
- communications'.
- SEC. 3. OBSCENE PROGRAMMING ON CABLE TELEVISION.
- Section 639 of the Communications Act of 1934 (47 U.S.C. 559) is
- amended by striking `$10,000' and inserting `$100,000'.
- SEC. 4. BROADCASTING OBSCENE LANGUAGE ON RADIO.
- Section 1464 of title 18, United States Code, is amended by
- striking out `$10,000' and inserting `$100,000'.
- SEC. 5. INTERCEPTION AND DISCLOSURE OF ELECTRONIC COMMUNICATIONS.
- Section 2511 of title 18, United States Code, is amended--
- (1) in paragraph (1)--
- (A) by striking `wire, oral, or electronic communication'
- each place it appears and inserting `wire, oral,
- electronic, or digital communication', and
- (B) in the matter designated as `(b)', by striking `oral
- communication' in the matter above clause (i) and inserting
- `communication'; and
- (2) in paragraph (2)(a), by striking `wire or electronic
- communication service' each place it appears (other than in the
- second sentence) and inserting `wire, electronic, or digital
- communication service'.
- SEC. 6. ADDITIONAL PROHIBITION ON BILLING FOR TOLL-FREE TELEPHONE
- CALLS.
- Section 228(c)(6) of the Communications Act of 1934 (47 U.S.C.
- 228(c)(6)) is amended--
- (1) by striking `or' at the end of subparagraph (C);
- (2) by striking the period at the end of subparagraph (D) and
- inserting a semicolon and `or'; and
- (3) by adding at the end thereof the following:
- `(E) the calling party being assessed, by virtue of being
- asked to connect or otherwise transfer to a pay-per-call
- service, a charge for the call.'.
- SEC. 7. SCRAMBLING OF CABLE CHANNELS FOR NONSUBSCRIBERS.
- Part IV of title VI of the Communications Act of 1934 (47 U.S.C.
- 551 et seq.) is amended by adding at the end the following:
- `SEC. 640. SCRAMBLING OF CABLE CHANNELS FOR NONSUBSCRIBERS.
- `(a) Requirement: In providing video programming unsuitable for
- children to any subscriber through a cable system, a cable operator
- shall fully scramble or otherwise fully block the video and audio
- portion of each channel carrying such programming so that one not a
- subscriber does not receive it.
- `(b) Definition: As used in this section, the term `scramble'
- means to rearrange the content of the signal of the programming so
- that the programming cannot be received by persons unauthorized to
- receive the programming.'.
- SEC. 8. CABLE OPERATOR REFUSAL TO CARRY CERTAIN PROGRAMS.
- (a) Public, Educational, and Governmental Channels: Section
- 611(e) of the Communications Act of 1934 (47 U.S.C. 531(e)) is
- amended by inserting before the period the following: `, except a
- cable operator may refuse to transmit any public access program or
- portion of a public access program which contains obscenity,
- indecency, or nudity'.
- (b) Cable Channels for Commercial Use: Section 612(c)(2) of the
- Communications Act of 1934 (47 U.S.C. 532(c)(2)) is amended by
- striking `an operator' and inserting `a cable operator may refuse
- to transmit any leased access program or portion of a leased access
- program which contains obscenity, indecency, or nudity.
-
- ------------------------------
-
- Date: Mon, 13 Feb 95 13:48:14 EST
- From: "W. K. (Bill) Gorman" <34AEJ7D@CMUVM.CSV.CMICH.EDU>
- Subject: File 4--Re: Senate Bill 314: Electronic Monitoring (fwd)
-
- -----------------------Original message----------------------------
- >Date: Sun, 12 Feb 1995 04:56:36 -0500
- >From: ah846@freenet.carleton.ca (Steve Crocker)
- >To: act@fc.net
- >--Re: Senate Bill 314: Electronic Monitoring (fwd)
- >
- >The following is the best comment I have seen so far on S314. Enjoy.
- >
- >-Steve
- >
- >Article #32884 (32938 is last):
- >From: aa387@cleveland.Freenet.Edu (Jim Kutz)
- >--Re: --> How about a Net Petition for this? (was Re: Senate Bill 314)
- >Reply-To: aa387@cleveland.Freenet.Edu (Jim Kutz)
- >Date: Thu Feb 9 23:38:42 1995
- >
- >
- >In a previous article, noring@netcom.com (Jon Noring) says:
- >
- >> Would there be any value to starting a net.petition drive on this matter,
- >> ala Clipper? Because I'm petitioned-out, I would not lead such a drive,
- >> but I am willing to act as e-mail signature tallyer since I got the system
- >> down pretty pat
- >
- >I think it would be more effective if people printed out a petition,
- >got signatures with addresses on the hardcopy, and mailed it to their
- >Senators and reps ( since a Senate bill can be blocked by the House ).
- >
- >I say that because most Congressional offices check whether or not
- >a signature belongs to a real voter with a real address in *their*
- >district. An *original* letter counts more than a carbon-copy
- >letter.
- >
- >Also, since many Senators are network-illiterate, it might
- >be well to remind them of the massive chilling effect that this
- >legislation would have on legitimate First Amendment speech,
- >and how many millions of voters that would tick off, and just
- >how committed the academic community and the technical community
- >are to academic freedom, and how loudly and publically they'll
- >scream for the heads of Congressmen who infringe on their First
- >Amendment rights.
- >
- >It might also be well to point out that such legislation would
- >impose tremendous financial burdens on every large-scale online
- >service provider. Instead of a system having one employee per
- >several hundred users, it would be necessary to have one (paid)
- >censor per several dozen users, which would shut down the vast
- >majority of affordable information services and BBSs, or cause
- >rates to go up *very* sharply. Hell hath no fury like a
- >computer game enthusiast shut off from freeware and shareware.
- >
- >There are studies to support the fragility of the Net with respect
- >to rate increases. For example, a few years ago the House
- >Telecommunications Subcommittee refused to allow the phone
- >companies to impose a $2.50 - $5.00 / hr. "access fee" for phone
- >lines used by value-added networks, because studies by the U.S. Commerce
- >Dept. showed that such a rate increase would have crippled
- >affordable student access ( including medical student access )
- >to information services and information networks ( the two
- >being largely synonymous, since most information providers
- >also carry message traffic for users ).
- >
- >The Commerce Dept. also pointed out that anything which 'chills' the
- >information industry in the U.S. also places the U.S. at a competitive
- >disadvantage relative to other countries (such as France)
- >which have more advanced telecommunications systems ( e.g.
- >Minitals ) and extremely favorable networking climates.
- >
- >So imagine what the impact would be if every network had
- >to police *every* message. Think about the cost of hiring
- >those censors coming out of *your* pocket to pay increased
- >network fees - which by the way is an unfunded mandate
- >imposing heavy burdens on private industry.
- >
- >It should also be pointed out that there's no way to
- >keep the U.S. Internet 'squeaky clean' as long as it's
- >connected to the global Internet, unless the U.S. wishes
- >to impose an 'information iron curtain' on every U.S.
- >university. That kind of thinking in the Soviet Union
- >is what hobbled academic advancement and scientific
- >advancement for many decades, making the Soviets look
- >like provincial hicks. It was also one of the main
- >factors which brought *down* the Soviet Union, because
- >scientists and academics who normally *avoid* politics
- >began opposing the Central Committee. There's an *enormous*
- >bandwidth of information passing between universities and
- >their students, with no practical way to police it all.
- >
- >Before Congress underestimates what the denizens of Internet
- >can do to defend themselves via networking, Congress would do
- >well to ponder just how quickly scientists and academics on
- >Internet drove the mighty Intel to its knees over defective
- >Pentiums.
- >
- >The same thing could happen to Newt Gingrich. Suppose for
- >example that one day in the not-too-distant future, Newt is
- >impressing the yokels with the Vast Internet-Awareness of his
- >leadership, and suddenly 4,000 blue-ribbon Internet experts
- >( including the authors of books about Internet ) deenounce
- >Newt and company as totally ignorant of the realities of Internet.
- >
- >Suppose that every major information service in this country,
- >and tens of thousands of Usenet sites in this country, and
- >hundreds of thousands of BBSs in this country, suddenly start
- >warning over 10 million users that they may soon have to pay
- >double or triple the cost of a subscription, because the moralists
- >in Congress wants to force net owners to be net police.
- >
- >Admittedly, there are serious problems on the Net, such as
- >pedophile activity. However I think that can be dealt with in
- >much the same way as the postal inspectors deal with it, by
- >drawing out the perpetrators and nailing them with stings.
- >Local police departments have been doing the same thing (as
- >in "Operation Longarm"). There's no need for draconian
- >measures that would affect legitimate networking.
- >
- >I don't think the Net should run scared. Don't forget that
- >every one of you has a printer capable of cranking out a *lot*
- >of flyers, which you can staple to every tree, and pass out
- >to every user group, and drop off in every student union in
- >America. All you need are the words to print, and there are
- >thousands of skilled writers out there who'll be as angry about
- >this as you are.
- >
- >Don't just inform computer users. What about those four or
- >five friends of yours who haven't gotten around to getting
- >a modem, or haven't gotten around to exploring Internet.
- >Suppose they find out they might *not* be able to explore
- >the Internet, because their local public access network
- >may have to shut down due to Congressional intimidation.
- >Suppose you share your fears that your school-age students
- >and their school-age students may not *have* affordable
- >online access to compete. Suppose the public becomes
- >*fearful* that the Internet may become as elite as it
- >was not too many years ago, when the 'information insiders'
- >were government contractors who had a slab of Congressional
- >pork at taxpayer expense for the price of a campaign contribution.
- >
- >I've watched public access develop over the past 15 years. I've
- >watched the Free-nets develop, with over 50,000 users in
- >Cleveland alone. I watched during the early days of the
- >Free-net movement, when elitists said it was *irresponsible*
- >to allow the public access to online free speech. I laughed
- >when I saw millions of people on CompuServe, and Genie, and
- >America Online, because I realized that there was no going back,
- >because those millions of people would never settle for less
- >than full network access. I walked through a Waldenbooks
- >store today, and saw that for the first time ever in history,
- >the hottest selling items were books about Internet, mostly for
- >the novice user willing to pay $25 or more for directions.
- >
- >I know how those people think. I've helped a few hundred
- >users get online and form special interest groups over the
- >past decade. I've seen how quickly they take to the Net
- >like a fish to water. I've seen how quickly they come to
- >value being able to post freely without waiting two days
- >for a censor to review every word. I've served as a
- >sigop, and I've seen firsthand just how responsibly the
- >public uses their First Amendment rights online.
- >
- >At issue are the rights of *everyone* to freedom of speech,
- >press, and assembly, rights which every one of you now takes
- >for granted - even though many of you may have an almost
- >buried fear that freedom is too good to last, because a
- >meddlesome government will louse it up.
- >
- >A bookstore owner isn't legally accountable for the content of
- >every book in the store, because the courts held that such
- >liability would chill not only freedom of the press, but also
- >would chill the right of the people to access information.
- >Similarly, a newscaster isn't liable if a live mike picks
- >up foul language when covering a town meeting. So why should
- >a newsgroup be held liable? If you get an assembly permit
- >and hold a meeting in the park, and an onlooker drops an
- >'obscene' magazine on the ground, are the organizers culpable?
- >Of course not!
- >
- >So why should an *online* repository of information be any
- >different? Well it shouldn't, because the right to *freely*
- >exchange information and ideas is a *Constitutional* right,
- >the very First Amendment in the Bill of Rights.
- >
- >However eternal vigilance is the price of liberty. If we're
- >not vigilant, Congress may establish a 'two tiered' Bill of
- >Rights, in which computer users have fewer rights than the
- >printing-press owners who feed you politically slanted news
- >from the partisan spin doctors.
- >
- >I remember the scary times back in the mid 1980s, when
- >the Reagan Administration tried to impose burdensome national
- >security regulations on public networks to limit access to
- >"sensitive but unclassified" data. The scheme was simple -
- >if you spoke your mind online, or accessed a fact online,
- >that was "data" - not free speech, because who are peons
- >to have free speech.
- >
- >In the mid 80's, the government argued that computer
- >communications shouldn't be counted as free speech, because
- >they weren't human voices. They argued that communications shouldn't
- >be private, because machines have no privacy. Finally we *did*
- >get the Electronic Communications Privacy Act. That made
- >possible *cheap* email, because the Electronic Privacy Act
- >*exempted* email carriers from liability for content, just
- >like the U.S. Post Office, or FedEx. Now, apparently,
- >Congress can't leave well enough alone.
- >
- >I remember back when there weren't any Free-nets or low-cost
- >national networks - just fat cat overpriced services eager
- >to dominate the market by making sweetheart deals with the
- >phone companies for 'gateway' services which would have
- >soaked all that the traffic would bear, if the courts hadn't
- >balked at the idea. True public access didn't *matter* to
- >those people, because all they were interested in was
- >lucrative commerce.
- >
- >Now the 'conservative' Congress is interested in something
- >else. They're interrested in currying favor with moralists
- >by slaying the ee-vil dragon of im-mo-ra-li-ty on Internet
- >and on the BBSs. Obviously they don't give a hoot about *your*
- >interests. You're an acceptible casualty. You got left out
- >of the partisan wheeling and dealing in the smoke-filled room.
- >
- >Think about the abuse potential of this law. Think about a
- >politician being able to intimidate the owners of a 'politically
- >incorrect' network because somebody unbeknownst to them is
- >smuggling erotica - or planting erotica or whatever. Bear in
- >mind that it's not uncommon for a big-city BBS can have over
- >200 million words of files (over a gigabyte). Who can
- >police all that.
- >
- >If you want representation in Congress, you're going to have
- >to get voters thinking your way, using all your powers of
- >networking and persuasion.
- >
- >You're also going to have to make a hard choice. You're going
- >to have to put *your* interests ahead of the non-issues that
- >the Party uses to herd the voters.
- >
- >Can you do that? Yes you can, for one reason. The terrain
- >is in your favor. Internet is not Politically Correct.
- >BBSs are not Politically Correct, for several reasons.
- >There's a *very* strong academic presence on Internet,
- >and academics value the free exchange of ideas above
- >almost anything else. There's also the *reality* of
- >the free exchange of ideas among *non*-academic users.
- >These are people who *discuss* political issues - they don't
- >just passively sit in front of the Toob lapping up simplistic
- >propaganda about what they 'should' think.
- >
- >Also, the online community has a *very* long memory. Once
- >articles and petitions start flying, they keep circulating,
- >often for years. The Net is a big place, and there are *lots*
- >of data sites where copies of a petition or persuasive article
- >can be lodged, to turn up again years later in time for elections.
- >
- >Use the 'long memory' of the Net. Watch C-Span II, and when a
- >butt-kissing 'party discipline' Congressman twists the issues or
- >plays dumb, WRITE IT DOWN. Put that statement on the nets.
- >Make sure EVERY online voter who values free speech gets to see
- >every word said AGAINST free speech.
- >
- >If one of these bozos is from your own Senatorial district,
- >find out who *else* he/she is selling out. Call for the
- >formation of 'grapevines' to pass around information -
- >and when you find out where the bodies are buried, PUT THAT
- >ON THE NET, and ask everybody to call every talk show they
- >can find and ask "what about this", and "what about that",
- >until Senator Bozo can't even fart sideways or sell a vote
- >without getting himself and his backers nailed to the wall.
- >
- >Organize boycotts against key Congressional districts if you
- >have to. Make clear to the voters of that district that if
- >they elect a 'hatchet man' to do a number on our rights, then
- >we the people can and will boycott their tomatoes, or widgets,
- >or whatever else they make, because when it comes to our
- >Constitutional rights, we're as determined as the Minutemen
- >of 1776 to defend our liberties.
- >
- >Is that too hardnosed? Maybe. It's also Constitutionally
- >protected speech, as long as you stick to facts. Partisans
- >do that sort of thing all the time. Mo-ra-lists lie like rugs
- >and urge you to vote for people who take food out of the mouths
- >of helpless infants. If that's the way the Game is played to
- >push a *partisan* agenda, then it's equally legit to protect
- >our networks.
- >
- >If Congress doesn't want to face that type of opposition, then
- >maybe they should reword their proposed legislation without the
- >vague language intended to intimidate First Amendment freedoms.
- >
- >Maybe they should treat the Nets with the same respect as they treat
- >bookstore owners, and newspapers, and public libraries - because the
- >First Amendment of the Bill of Rights applies equally to
- >every citizen and entity. If Congress can't respect the Bill
- >of Rights, then Congress *should* be opposed tooth and nail.
- >If a Congressman even *once* opposes the Bill of Rights, then
- >that Congressman should be RELENTLESSLY targeted for defeat
- >by any networkers inclined to do so - to make *sure* that that
- >Congressmen is never given a second chance to infringe our
- >liberties.
- >
- >Congressional backers and campaign contributers may need to
- >be shown that the First Amendment is the 'third rail' of
- >politics - touch it, and their candidate is dead politically,
- >down the tubes along with whatever investment his/her backers
- >have made.
- >
- >There's one important fact to remember about bullying moralists:
- >they attack the weak. They may need to be *shown* that we the
- >people can make those attacks costly, until every Congressman
- >who dares to attack the Internet fears for his/her political career.
- >Then you'll have fewer Congressmen sucking up to moralists.
- >
- >I don't believe for an instant that most Congressmen have any
- >commitment whatsoever to morality. If they did, they wouldn't
- >be slashing aid to dependent children, including several million
- >infants. I think those Congressman are sucking up to moralists
- >for a *practical* reason - they want the support of preachers
- >who can sway voters from the pulpit.
- >
- >Well think about it. We've got an *enormous* pulpit here on
- >the Net. We can reach millions of people, possibly *more*
- >people than are swayed by preachers, because network regulation
- >hits networkers where they live. What's more, we can reach
- >millions of *networkers*, people who *know* how to communicate.
- >
- >Another useful attribute of the Net is its heterogeneity.
- >People on the Net are exposed to so many viewpoints that they
- >can't be 'herded' by Congress. When Congress bullies some other
- >industry, Congress can force that industry to the bargaining
- >table - "go along with this or we regulate". That won't work
- >on the Net. Once Congress stirs up a hornet's nest on the Net,
- >people will do whatever they feel they must to oppose those
- >Congressmen - and they'll keep doing it regardless of what
- >'secret deals' are proposed.
- >
- >The usual Congressional tactic of striking terror into the heart
- >of an industry will still work - but with one important difference.
- >Opponents of opressive *online* regulation don't have to rent
- >auditoriums and lick envelopes and get tax-exempt status to organize
- >opposition. They've already *got* super-powered networking access
- >right on their desks, without even getting off their duffs or
- >rummaging for a stamp.
- >
- >So be sure to grab copies of the best writings on these topics.
- >Pass them around. When people in your community come to you
- >to get some printout for their kids' school project, give them
- >some printout about rights too - and carefully explain that if
- >burdensome regulation goes through, freebies might become very
- >hard to get, because costs may go up.
- >
- >I don't say that costs *will* go up because I'm not absolutely
- >sure. I believe costs will go up unless the legislation fails.
- >Whatever you believe, whatever you fear, *communicate* that to
- >others, and don't be intimidated - because you are after all a
- >resident of the Nets, and your opinion is worth something.
- >
- >Thanks very much for reading, and have a pleasant crusade :)
- >
- >
- > - Jim Kutz
- > Internet: aa387@cleveland.freenet.edu
- >--
- > "Knowing what thou knowest not
- > Is, in a sense
- > Omniscience."
- > - Piet Hein
-
- ------------------------------
-
- Date: 14 Feb 95 13:11:18 EST
- From: Lance Rose <72230.2044@COMPUSERVE.COM>
-
-
- As widely reported, the "Exon amendment" has been reintroduced in
- this year's Congress. It would expressly extend existing FCC phone
- sex regulation to online services of all sorts, and add a new
- provision that apparently would make it illegal for an online system
- or BBS to connect to the Internet, or at least any part of the
- Internet that contains stuff that might be coonsidered obscene.
-
- The Exon Amendment has been widely denounced by online veterans,
- while at the same time gaining a lot of support from parents of kids
- who go online. I agree that at least part of it -- making illegal any
- giving of access to obscene materials -- has got to go. However, we
- need to recognize the political reality that when the moralists and
- family value types, represented in this case by Senator Exon, slam
- their fists down against online pornography, then online pornography
- has to give some ground.
-
- But let's leave this mainstream discussion aside for a moment. How
- many of us are pausing, for even a second, to appreciate the
- stabilizing effects of a law like the Exon Amendment? With certain
- adjustments, it can set up a nice safe harbor, giving onliners
- nationwide far clearer guidance on how to stay within legal bounds.
-
- With a few changes, the Exon Amendment can be a big winner, instead
- of the latest chapter in the oppression of the online world. With the
- general subject of regulating sexual content of online systems on the
- table, let's use the opportunity to get online systems the help and
- protections they've needed for years.
-
- Here are the changes that would make the Exon amendment come up a
- winner:
-
- 1. Get rid of the proposed change to the existing voice phone
- harassment provision, Section 223(a), which would make it illegal to
- "make available" obscene, etc. messages to others. This would make
- all Internet-connected systems liable. Voice phone harassment should
- remain voice phone harassment, and there's no good reason for skewing
- the law this way.
-
- 2. Have this national law preempt *all* state laws on obscenity and
- indecency over phone lines, period. This would be a BIG bonus.
- Geographic localities couldn't set up "obscenity speed traps" for
- unwary out-of-state BBS'.
-
- 3. Similarly, have the law prescribe that all prosecutions MUST be
- held in the county where the defendant is located. No more
- prosecutions where half the battle is won simply forcing defendants to
- defend in out of state courts. It would also help restore some sense
- that the local community's values will control, though not formally or
- strictly in this case.
-
- 4. The law should also specify the "community" whose standards will
- be used for obscenity prosecutions under the law, in a step by step
- procedure. First, the court should determine if there is a relevant
- online community whose standards can be used. Feeding into such a
- determination might be, for instance, whether an identifiable
- community defines its borders adequately with age verification
- procedures. If there is no such viable community, then the court must
- look to the local geographic community where the defendant based his
- or her operations. If there is no such base of operations, only then
- will the "offended" community's values be used for obscenity purposes.
-
- 5. If the defendant is prosecuted in his or her role as operator of
- an online system or service claimed to be illegal, then the prosecutor
- must show that the service is "generally and obviously illegal" to
- impose liability on the sysop based simply on system contents.
- Otherwise, the sysop can only be prosecuted for messages or materials
- to the extent to which he or she was actually familiar with them, and
- which he or she knew or should have known were illegal or likely to be
- illegal.
-
- With these changes, the Exon Amendment could be converted into a nice
- statute setting out clear standards for a reasonable, national law of
- cyberspace indecency and obscenity.
-
- Anybody up for pushing for this approach? It's a heck of a lot more
- realistic than thinking we can win a war about online sex against the
- moralists. Confusin' 'em with reasonableness might work.
-
- - Lance Rose
- Author, "NetLaw"
-
- ------------------------------
-
- Date: Thu, 23 Oct 1994 22:51:01 CDT
- From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: File 5--Cu Digest Header Information (unchanged since 25 Nov 1994)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- In ITALY: Bits against the Empire BBS: +39-461-980493
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
- ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
-
- The most recent issues of CuD can be obtained from the NIU
- Cu Digest WWW site at:
- URL: http://sun.soci.niu.edu:80/~cudigest
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #7.13
- ************************************
-