home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun Feb 26, 1995 Volume 7 : Issue 16
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Semi-retiring Shadow Archivist: Stanton McCandlish
- Correspondent Extra-ordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Monster Editor: Loch Nesshrdlu
-
- CONTENTS, #7.16 (Sun, Feb 26, 1995)
-
- File 1--Press Coverage Bloopers in the Mitnick Story (fwd)
- File 2--NEW: CYBER-RIGHTS - Campaign for Cyber Rights (fwd)
- File 3--S. 314 and realism
- File 4--Fascism on line
- File 5--Dennis Erlich Relates CoS Search and Seizure (Illegal?) (fwd)
- File 6--Re: Slam of the Internet in STAR
- File 7--first italian initiative on comp networks
- File 8--Cu Digest Header Info (unchanged since 26 Feb, 1995)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ----------------------------------------------------------------------
-
- Date: Tue, 28 Feb 1995 00:44:29 -0600 (CST)
- From: Computer Underground Digest <cudigest@SUN.SOCI.NIU.EDU>
- Subject: File 1--Press Coverage Bloopers in the Mitnick Story (fwd)
-
- ---------- Forwarded message ----------
- Date--Mon, 27 Feb 1995 22:33:24 -0800
- From--Jason Hillyard <jasonh@sdepl.ucsd.edu>
-
- By now we've all read about the extraordinary events that led to the arrest of
- Kevin Mitnick. As usual, the press got some things right, got many things
- wrong, and occasionally just got weird. I was bothered by many of the
- misconceptions that were played out in the press. Determined to find out
- more, I went on manic foraging expeditions through the Web, waded through
- piles of alt.2600 posts, and wheedled juicy tidbits from some of my hacker
- friends. The result is this playful yet critical romp through the best of the
- worst of the Mitnick story coverage.
-
- "L.A. Hacker to Waive Extradition"
- Los Angeles Times, February 17, 1995.
- <http://underground.org/newswire/latimes-021795.html>
-
- "The FBI affidavit filed in the case alleges that Mitnick used his hacking
- prowess to steal files through the Internet, including cellular phone software
- developed under a grant from the National Security Agency worth $500,000 to $1
- million."
-
- Whoa! FBI catches hacker with million dollar NSA software! No doubt this
- sentence confirmed the fears of paranoid conspiracy buffs everywhere. But the
- affidavit says no such thing. Rather, it says the hacker copied a file called
- "Berkeley Packet Filter" which was developed under a grand from the NSA. It
- says the hacker also copied "cellular telephone proprietary software" from
- Shimomura's computer. This cellular software was valued at $500,000 to $1
- million dollars by Andrew Gross, a system administrator at the San Diego
- Supercomputer Center. Apparently the reporter tried to compress all this into
- one sentence, with rather absurd results.
-
- "Tight phone restrictions on suspected cyberthief"
- News & Observer, February 17, 1995.
- <http://www.nando.net/newsroom/nt/217thief.html>
-
- "A federal judge Friday set strict limits on jailhouse telephone calls for the
- computer pirate accused of stealing billions of dollars worth of corporate
- information by tapping into electronic networks."
-
- Read that again. Did they say billions? According to the FBI affidavit,
- Mitnick allegedly copied software worth up to $1 million from Shimomura's
- computer. Where did this billions come from? Perhaps the reporter was
- confused after writing a story on federal spending.
-
- "A Cyberspace Dragnet Snared Fugitive Hacker"
- The Los Angeles Times, February 19 1995.
- <http://underground.org/newswire/latimes-021995.html>
-
- "Convinced that they could protect their subscribers' privacy, administrators
- of the Well agreed to work with Shimomura and the FBI, and set up 24-hour
- monitoring hoping that Mitnick would break into the system to store more
- purloined files."
-
- According to the FBI affidavit, The hacker had root access on The WELL. The
- WELL states, in their own FAQ on the subject, that the hacker had access to 11
- user accounts. There is no way The WELL could protect their subscriber's
- privacy during the 18 days they let the hacker roam freely through their
- system.
-
- "Hacker case underscores Internet's vulnerability"
- New York Times, February 16, 1995.
- <http://www.nando.net/newsroom/nt/216net1.html>
-
- "And just a few hours before his arrest, they say, he delivered a last
- electronic blow that nearly destroyed the Well and the electronic community it
- served."
-
- Mitnick almost destroyed The WELL? Not quite. According to The WELL's FAQ,
- the hacker erased one accounting file, probably because of a typing error.
- The WELL was taken down briefly to restore the file and then brought back
- online. Miraculously, The WELL and the electronic community it serves
- remained intact.
-
- "Hacker case is a challenge as authorities try to retrace suspect's steps in
- cyberspace"
- News & Observer, February 17, 1995
-
- "Proving Mitnick was behind the raids on data banks and thefts of at least
- 20,000 credit card numbers from computer systems across the nation will be
- a special challenge involving retracing the alleged hacker's steps in
- cyberspace."
-
- Maybe it's just me, but doesn't this make it sound like Mitnick was raiding
- credit card numbers from computers across the nation? Mitnick allegedly
- copied one credit card file. This file belonged to Netcom. There is evidence
- that this file was compromised as far back as last summer. Actually, the
- Netcom credit card file was kind of a joke in hacker circles. People had
- posted bits of it on IRC. Maybe Netcom should explain why this information
- was online in the first place.
-
- "Cyber sleuths nab infamous hacker"
- San Francisco Examiner, February 16, 1995.
- <http://sfgate.com/examiner/daily/950216/hacker2.html>
-
- "Some clues pointed to the hacker's identity, according to the New York Times.
- For instance, the stolen material found on The Well and other Internet sites
- included software that controls the operations of cellular telephones made by
- Motorola, NEC, Nokia, Novatel, Oki, Qualcomm and other companies. That was
- viewed as consistent with Mitnick's interests. He made a name for himself by
- hacking into telephone networks."
-
- Mitnick and every other hacker on the planet would probably be interested in
- this kind of cellular phone software. It does not single out Mitnick as a
- suspect.
-
- But wait, the article points to more evidence:
-
- "The computer pirate left voice-mail messages for Shimomura after the December
- theft. One - using what investigators said was a mock British accent favored
- by Mitnick - said, 'My technique is the best. . . . Don't you know who I am?'"
-
- British accent or not, the voice-mail messages are a dubious source. I think
- they sound more like some hackers goofing off on a conference call than a
- serious threat from a lone hacker. (Have a listen for yourself. The
- reference is given at the end of this post.) But nevertheless, the press
- insists that Mitnick left these messages. I'd like to see some definitive
- proof.
-
- And the article provides this last bit of evidence:
-
- "Finally, the pirate was acting with a recklessness that was one of Mitnick's
- trademarks. At one point during the inquiry, the Times said, the hacker broke
- into a Motorola Corp. security computer as investigators monitored the raid."
-
- Why is this reckless? Because the hacker broke into a so-called security
- computer? Because investigators were watching? I'd still really like to know
- how investigators determined that Mitnick was behind the keyboard. I've yet
- to hear a convincing answer.
-
- "Officials Laud Civilian Cyberexperts in Capture of Hacker"
- San Francisco Examiner, February 17, 1995
- <http://sfgate.com/examiner/daily/950217/hacker.html>
-
- "'The vast majority of citizens in cyberspace are law-abiding and interested
- in helping the government and stopping cybercrime,' said Assistant U.S.
- Attorney Kent Walker, who helped to coordinate the coast-to-coast Mitnick
- investigation."
-
- I suppose Mr. Walker is entitled to his opinion, but check out his causal
- usage of cyberwords! I wonder-- if you are caught committing a cybercrime in
- cyberspace, are you sent to cyberprison?
-
- And finally, here's my personal favorite:
-
- "Hacker invaded the wrong man's cyberspace"
- News & Observer, February 17, 1995.
- <http://underground.org/newswire/nao-021795.html>
-
- "For an unknown reason, agents waited five minutes for Mitnick to answer the
- door. On Friday, law enforcement officials said it is not their habit to slam
- down doors on nonviolent criminals."
-
- Now that's nice to know. Yet hackers who have been raided in the past often
- experienced less congenial displays of door-slamming etiquette. Perhaps the
- FBI has a more conservative door-booting policy than, say, the Secret Service.
-
- Gotta go, there's a knock at the door. Only got five minutes to wipe the
- drive!
-
- Additional References
-
- John Markoff's story in _The New York Times_:
- <http://www.nando.net/newsroom/nt/215sleuth.html>
-
- Pictures of Mitnick and Shimomura:
- <http://sfgate.com/examiner>
- <http://underground.org/graphics/people/shimomura.gif>
- <http://underground.org/graphics/people/mitnick.gif>
-
- The voice-mail messages:
- <ftp://ftp.sdsc.edu/pub/security/sounds/tweedle-dee.au>
- <ftp://ftp.sdsc.edu/pub/security/sounds/tweedle-dum.au>
-
- Technical details of the attack on Shimomura's machine:
- <http://underground.org/newswire/shimomura-attack.html>
-
- ------------------------------
-
- From: Stanton McCandlish <mech@EFF.ORG>
- Subject: File 2--NEW: CYBER-RIGHTS - Campaign for Cyber Rights (fwd)
- Date: Wed, 22 Feb 1995 18:07:21 -0500 (EST)
-
- From--"Richard K. Moore" <rkmoore@iol.ie>
-
- CYBER-RIGHTS on LISTSERV@CPSR.ORG: Campaign for Citizens Rights in Cyberspace.
-
- This list is the "coordination headquarters" for the global Cyber
- Rights campaign being conducted by CPSR (Computer Professionals for
- Social Responisibility.) CPSR is a highly respected public service
- organization that has an effective track record in influencing
- legislation and regulation. CPSR contributed to the exposure of
- the fallacies behind the Star Wars project and helped defeat the
- Clipper Chip. Additional information about this campaign is
- included at the bottom of this message.
-
- CYBER-RIGHTS is moderated.
-
- List owner: Richard K. Moore <rkmoore@iol.ie>
-
- To subscribe to CYBER-RIGHTS, send the following command to
- LISTSERV@CPSR.ORG in the BODY of e-mail:
-
- SUBSCRIBE CYBER-RIGHTS yourfirstname yourlastname
-
- For example: SUBSCRIBE CYBER-RIGHTS Joe Shmoe
-
-
- ------------------------ Additional Information -----------------------
-
- SUPPLEMENTARY INFORMATION: CYBER-RIGHTS FAQ:
- ============================================
-
-
- =================================================================
- | cyber-rights@cpsr.org FAQ :: 19 Feb 95 - rkmoore@iol.ie |
- =================================================================
- (OK to fwd)
- ______________________________________________
- |>* The Campaign for Rights in Cyberspace *<|
- |>* *<|
- |>* Working Group: Computer Professionals *<|
- |>* for Social Responsibility (CPSR) *<|
- |_____________________________________________|
-
- Answers to Frequently Asked Questions
- FAQ: 19 Feb 95
-
-
- The Cyber Rights Campaign is being managed as a Working Group of CPSR
- (Computer Professionals for Social Responsibility, a highly respected public
- service organization. CPSR has been effective in influencing Federal
- legislation re/ the social impact of technology.
-
- One purpose of the Campaign is to educate the global public about the
- beneficial social/political aspects of the current Internet
- group-communications model: to make everyone aware that preservation of
- Internet-style communities should be seen as global priority.
-
- A second purpose of the Rights Campaign is to alert the USA and global
- communities to the intense telco-funded legislative campaign currently
- threatening the Internet's existence:
- o In the short term, the Censorship Bill (S.314) would require Internet
- service providers to snoop on and censor all message traffic: this would
- be devastating to current Internet usage patterns and a fundamental
- denial of freedom of speech, association, and privacy.
-
- o In the longer term, Newt Gingrinch and the telcos are
- attempting to set up a regulatory framework for a new
- interactive-media infrastructure which would eliminate
- the grass-roots uses of interactive communications, and
- build instead a fully commercialized, 500-channel, mass-media
- marketplace fully as sterile as today's network TV.
-
- =================================================================
- ______________________________________________
- |>*-----To participate in this campaign -----<|
- |>* *<|
- |>* Send the message: *<|
- |>* subscribe cyber-rights Your Name *<|
- |>* to listserv@cpsr.org *<|
- |>* *<|
- |>* Post a self intro to: *<|
- |>* cyber-rights@cpsr.org *<|
- |>* *<|
- |>* To unsubscribe, tell the listserv: *<|
- |>* unsubscribe cyber-rights *<|
- |>* *<|
- |>* Questions to WG Coordinator: *<|
- |>* Richard K. Moore <rkmoore@iol.ie> *<|
- |_____________________________________________|
-
- =================================================================
-
- ___________________
- # Working Documents
- #
- #---> Currently available on request:
- |
- | o PFF's "Magna Carta" (2/2) (fwd)
- | o CR-20Jan> "Magna Carta analyzed" (2/2)
- | o CR-17Feb> INFO: S.314 Analyses
- | o CR-3-Feb> Declaration of Rights (draft) (2/2)
- | o CR-16Feb> Summary: Cyber Rights Campaign
- | o CPSR's "NII-Document-Serving-the-Community" (5/5)
- |______
- =================================================================
-
- ___________________
- # Volunteers needed
- #
- #---> Your chance to make a difference:
- |
- | o to create OpEd pieces
- | o to place pieces in worldwide media
- | o for liaison with other lists and organizations
- | o to participate in activist discussion process
- | o to broaden the experience-base of our campaign community
- |______
- =================================================================
-
-
- ============================================== __---__
- (o) ____________________________________________________ - | -
- / \ />-- posted by: Richard K. Moore <rkmoore@iol.ie> --<\ - | -
- /___\ />--- Wexford Town, Ireland :: Loch Garman, Eire ----<\ - /|\ -
- /--------------------------------------------------------\ -_/ | \_-
- />- Don't let the grinch steal cyberspace -<\*Guard your \ ---
- /*>- CYBERSPACE INC won't have listservs! --<*\ Cyber Rights*\
- /-> Ask to see >--> CyberRights Campaign FAQ <--\ Beware: TRON \
- /________________________________________________________________\
-
-
-
-
- ---------------------------------------------------------------------
- DISCLAIMER: NEW-LIST announcements are edited from information
- provided by the original submitter. We do NOT verify the technical
- accuracy nor any claims made in the announcements nor do we
- necessarily agree with them. We do not warranty or guarantee any
- services which might be announced - use at your own risk. For more
- information send e-mail to LISTSERV@VM1.NoDak.EDU with the command
- GET NEW-LIST README in the body. mgh
-
- ------------------------------
-
- Date: Mon, 20 Feb 95 10:46:11 EDT
- From: Jerry Leichter <leichter@LRW.COM>
- Subject: File 3--S. 314 and realism
-
- There's been a good deal of complaint about the Exon bill and its
- proposal to hold communications providers responsible for the content
- of messages. I think the underlying complaint is well placed, but the
- most common analogy people use is fundamentally flawed. This is the
- "provide is just like a bookstore/newseller and they are protected"
- analogy.
-
- The problem here is that there is a fundamental difference between the tradi-
- tional publishing scenario and the on-line world. The difference is most
- compelling in the case of libel. If I'm libeled in a book or newspaper, it is
- straightforward for me to determine the publisher of the book or newspaper. I
- can usually determine the author directly - but if I can't, that's not normal-
- ly a problem: Unlike the bookstore, the publisher has no protection against
- my lawsuit. If he doesn't want to identify the author, that's fine with me -
- I'll recover all my damages from him. Of course, in practice, he'll
- be only to glad to refer me to the author, pseudonymous or not, so
- that the author can share in paying any damages. Note that most
- newspapers are happy to publish unsigned letters to the editor - but
- they insist that *they* have receive a signed copy.
-
- Sure, a bookstore *could* sell a book with no publication information
- on it. If I were libeled by such a book, I'd argue that the bookstore
- had two choices: Tell me where they got the thing, of buy into
- responsibility for it. I don't know if such a thing ever happened,
- but I would be very surprised if a bookstore had any right to refuse a
- demand for information about the source of books it sold. If it sold
- books with no information about who was writing or publishing them -
- "Hey, I leave the cash in an unmarked envelope under the doormat and a
- box of books appears at the back of the store" - well, that would make
- for an interesting argument for an exception to bookstore's general
- immunity.
-
- Now consider what happens on-line. Many message~~/\~~
-
- ------------------------------
-
- Date: Sat, 18 Feb 1995 11:16:13 -0500 (EST)
- From: anonymous@DELPHI.COM
- Subject: File 4--Fascism on line
-
- PLEASE DO NOT USE my e-mail address or my real name anywhere.
-
- -----------------------------------------------------------
- The New American Fascism Online
- By William Smithson
-
- Many people who use the online services are too young to remember
- (and only know what they've read about) the suppressive regimes of
- Adolph Hitler and Joseph Stalin. Yet some online services are
- remarkably similar to these regimes.
-
- These services are causing much dissension among youth and other
- people online, because they use strong repressive tactics. Their
- assumption is that they--not the users--know what is best for the
- users.
-
- A democracy is ruled by law, with the law written by the
- representatives of the people, by the people and for the people. In
- a fascist and socialist government, the law is written by those in
- power. They must accept this law or suffer the consequences. We
- need only look at George Orwell's "1984." There we saw how the mind
- police worked; Big Brother dictated what the people could do and
- couldn't do. They controlled what citizens could see and could not
- see, could and could not say.
-
- Let's take America Online (AOL) as an example. AOL is basically
- ruled by one person: Steve Case, CEO. [It should be noted that a
- member of the AOL Board of Directors is former Secretary of State
- Alexander ("I'm in charge here") Haig, Jr.]
-
- Case's Black Shirts are the TOS (Terms Of Service) Advisors. They
- have taken rules and regulations set up by themselves, and used them
- against the people who proliferate on AOL. They tend to suppress
- what they don't like for what they think is correct. They accept
- hearsay without corroborating facts. They take manipulated written
- words, and use it against individuals. They are judge, jury and
- executioner. Persons can't defend themselves against innuendo, or
- libel. There's no place or person to whom they can go to express any
- injustices perpetrated against them.
-
- AOL seeks to justify this action by stating they are running a
- business. Yet they are dealing in people's lives, people who are
- part of a new type of community. What we appear to have here is the
- promulgation of a new form of societal repression: a new fascism, a
- new totalitarianism.
-
- The people who access AOL feel this oppression and see it daily, but
- many are at a loss to understand it. There is a great deal of
- bigotry online: anti-Semitism, anti-black sentiment, anti-Asian
- sentiment and anti-Latino sentiment. The majority of Americans are
- not represented on AOL. The average middle class and lower class
- person cannot afford to use this service.
-
- Some Jewish people fight back, but many have been the subject of
- anti-Semitic slurs. Gays and lesbians have to put up with daily
- gay-bashing. African-Americans and Latinos have been subjected to
- racial epithets. The religious right is also subjected to attacks
- and made the representative of being the suppressor and the one
- behind much of what is not their doing or their thinking. There are
- those who know how to manipulate text in chatrooms, to attribute
- vulgar words to others who never used them.
-
- The ones who suffer the most from these repressive tactics are young
- children and teenagers, those who are in turmoil and are not too
- likely to get a sympathetic ear from any adult. AOL claims it is
- protecting these teens and children, as they are minors and can't
- think for themselves or protect themselves. So teenagers are given
- rooms to let them talk with their peers. But children are subjected
- to endless hours of the same question over and over again, as to
- their age and sex.
-
- The teen rooms are also anti-gay, anti-black, anti-Semitic, ad
- nauseam--often echoing their parents' thoughts and actions. The gay
- and bi teens have no place to meet one another. They can't go to the
- regular teen rooms, because of the anti-gay bias. Gay teens try
- forming their own rooms but AOL's TOS staffers close them, telling
- them to go to adult rooms or the regular teen rooms. But in the
- adult rooms, many are harassed by individuals that AOL is supposedly
- protecting them from--child molesters.
-
- The media has made a big thing about all the people online who are
- after our children. Much of that reporting (fortunately for our
- kids) is media hype, designed to sell papers and boost TV ratings.
- [See Steve Silberman's excellent article in WIRED 2.11 entitled
- "We're Teen, We're Queer, and We've Got E-mail."]
-
- Gay teens are told not to tell others they are gay or bi, because
- that subjects them to constant badgering and harassment by older
- adults, pedophiles, mentally ill individuals, and others who despise
- gay teens. Being a gay teen on AOL is more than difficult. The gay
- community at large does not want to be seen with them or be seen
- talking with them, for fear they will be classified as child
- molesters. This includes the National Gay & Lesbian Task Force
- (NGLTF), which maintains an online presence on AOL, but has basically
- remained uninterested in the AOL/gay teens conflict.
-
- This situation will tend to get worse as time passes, unless it is
- remedied by local laws or by Congress. Over time as people continue
- to access these services and they grow in size, it could eat into the
- very fabric of democracy in the U.S.
-
- Here in the U.S., democracy as we know it could disappear and the
- people controlled online by cyber-fascism and cyber-suppression--and
- governed by the cyber-police. You can see this in action, and see
- where it is heading just by becoming a member, and seeing you have no
- way to redress grievances. This might be your future, America, and
- that of the world's--taken over by a few who think they as
- individuals know better than the majority.
-
- I write this as a parent, for I listen to what my children tell me.
- I have sat with them for many hours in front of the computer and seen
- firsthand what is happening--and I don't like it. I was a teen
- during WWII and read daily accounts of what the Nazis were doing. I
- lived through the cold war and the Stalin repression era. I was
- among the many who felt the bite of McCarthyism, and suffered from
- that haunting feeling of someone looking over my shoulder, seeing
- what I was reading and what I was saying.
-
- While online, an anonymous person may be spewing lies about someone,
- and that person has no way to defend himself. There are no
- safeguards or democratic principles at work in many of the online
- services. It is an erosion of all that many people hold dear, and
- what most people want from a democracy. They do not want to have
- someone rule them, without being a part of the ruling process.
-
- Some individuals online have even threatened the parents of
- children who are online. It's why my own children are told not to
- give out their real last name, where they live, their phone number,
- or where they go to school. Children are very trusting of adults,
- and many of these people are glib talkers and charmers. One child
- on PRODIGY made the mistake of giving out his phone number, and his
- parents were receiving calls day and night.
-
- There are countless nightmarish stories that the gay teens can tell,
- but you won't hear nor read about most of them, because on most of
- the online services, the thinking is Victorian. In their view, the
- children are precious innocents; the sexually active, heterosexual
- teen does not exist, and the gay teen doesn't exist,
-
- People become so involved and so much a part of the online community
- that it becomes their world. However, it can be a place of great
- learning, and a place to meet some wonderful people. It can be a
- place to interact with others without interacting offline too.
- However, given the current trend and the reprehensible way the major
- online services treat people as inanimate objects, it may not be the
- place that visionaries dream for the coming information superhighway.
- -------------------------------------------------------------------
- William Smithson is a pseudonym for a concerned parent who wishes to
- remain anonymous.
-
- ------------------------------
-
- Date: Thu, 16 Feb 1995 22:36:19 -0600 (CST)
- From: David Smith <bladex@BGA.COM>
- Subject: File 5--Dennis Erlich Relates CoS Search and Seizure (Illegal?) (fwd)
-
- ---------- Forwarded message ----------
-
- From--dennis.l.erlich@support.com
- Subject--ILLEGAL SEARCH AND SIEZE
- Date--Mon, 13 Feb 95 22:53:16 -0800
-
- This morning at 7:30 am my doorbell was repeatedly rung by a man
- in a suit with papers. I didn't open and when he didn't go away
- I called 911. I was told by the 911 operator of the Glendale
- Police that I had to let these people (there was a crowd of about
- 12) into my house because of a search warrant.
-
- I went out on the front porch and talked to an on-duty Glendale
- police officer, Steve Eggett (badge# 12126). He informed me that
- I was required to permit these people to enter my house and
- search for copyrighted material.
-
- Two armed off-duty officers from the Inglewood police department
- were working as rent-a-cops (Sgt. Ed Eccles and Officer Mark
- Fronterotta) for the private investigation firm of Robert Shovlin
- (PI lic P116086) of RJS Consultants. His firm was in the employ of
- Thomas Small, atty for Religious Technology Center. Small also
- entered my house. Warren McShane (an officer of RTC, the
- plaintiff) and Paul Wilmshurst (a scieno computer expert) also
- entered.
-
- I objected but was told that they would use force if I resisted.
-
- They presented me with 6" of legal documents, one of which was a
- writ of sezure from a Northern Calif. Federal Judge - Ron Whyte.
- It is case # C-9s-20091 RMW.
-
- They were in my house going through my drawers and every computer
- disk and file from 7:30am to 3pm.
-
- They confiscated over 300 floppy disks. Two 120 meg Colorado
- tape back-ups of my hard disk and deleted any files on my hard
- disk that they wanted.
-
- Potentially they copied all my personal correspondence, mailing
- lists, financial records and personal notes. Any one who has
- sent me anything in confidence must assume that it has been
- compromised.
-
- The LA Times will run a story in the 14 Feb issue. Fox had a
- camera crew who videoed me begging the Glendale Police not to let
- them confiscate my material without me examining the disks and
- copies to see specifically what they were taking. I was refused
- the right to even look at what they had copied from my disk.
-
- Criminals being arrested have more rights than these officers of
- my home town and of the court provided me.
-
- I hope this at least shows what type of fascist organization I am
- attempting to expose.
-
- Later,
-
- Rev. Dennis L Erlich * * the inFormer * *
- <dennis.l.erlich@support.com>
-
- ------------------------------
-
- Date: 23 Feb 1995 08:19:09 -0700
- From: "gmcmillan@east.pima.edu"@PIMACC.PIMA.EDU
- Subject: File 6--Re: Slam of the Internet in STAR
-
- From--gmcmillan@east.pima.edu
- Date--23 Feb 95 08:18:45 MST
-
- I would like to mention the article in 2-22-1995 AZ DAILY STAR,sec. B,
- p. 3
-
- King features business columnist Dale Dauten slams the Internet:
-
- Title: "As Information Source Unwieldy Internet
- Fails to Deliver."
-
- Many points that Mr. Dauten makes are the results of 1/2 hr.
- online, guided by two business colleagues.
-
- I beieve his search for knowledge sought a negative outcome.
- He published this outcome on the babsis of scant acquaintance with
- the Net in order to discredit it and help "sub-divide" to "service
- providers." [I base this statement upon the fact that the only
- refs. comparing the Net to private services make the Net appear
- worse.
-
- The charges are not wholly groundless, but an over-all card
- catalog IS being developed and Yahoo at stanford works pretty well
- in the meantime: http://akebono.stanford.edu
-
- The argument that not enough resources for business (and the
- stock market) is belied by Yahoo with its 8000 sites in business
- and the market.
-
- The argument that provider of private Internet access run
- rings around the Net itself is spurious as well. There are servers
- claiming full access. When their customers are questioned, they do
- not even have LYNX or easy access to FTP files.
-
- Anyone wishing to contact Mr. Dauten at King Features for a
- copy of his slam of the Interent may do so at:
-
- Compuserve (73654,3711)
-
- That translates to a regular Internet address of:
-
- 73654.3711@compuservE.com
- (The "E" is important.)
-
- Thanks,
-
- Gloria McMillan
-
- ------------------------------
-
- Date: Thu, 23 Feb 1995 21:45:55 +0000 (CUT)
- From: Luc Pac <lpaccagn@RISC1.GELSO.UNITN.IT>
- Subject: File 7--first italian initiative on comp networks
-
-
- FIRST ITALIAN NATIONAL INITIATIVE IN DEFENCE OF
- AMATEUR COMPUTER NETWORKS
-
- The first Italian national conference of amateur computer
- networks, held last weekend, ended on a successful note. The central
- theme of the gathering, ably hosted by the Museo Pecci in Prato (near
- Florence), concerned 'the right to communicate'.
-
- In all, two thousand people took part in the conference, drawn
- from the whole gamut of Italy's amateur networks and bulletin boards.
- More than fifty speakers and numerous papers made the proceedings a
- lively affair. Amongst those participating were a number of
- internationally renowned figures - from Honoria and Mafalda Stasi to
- Matthew Fuller - as well as speakers from various Italian institutions,
- including Prof.Attardi of the University of Pisa.
-
- Whatever the differences that sometimes characterised this
- wide-ranging discussion, the defence of freedom of expression and
- communication stood out as a common thread running through all the
- interventions. This sentiment was spelt out concretely in the following
- document, which was endorsed by virtually all those in attendance.
-
- "We, individuals and organisations, gathered on 19/2/95 at the
- conference on 'Right to Communication at Millenium's End', held at the
- Museo Pecci in Prato, express our deep concern at the climate of
- intimidation which currently surrounds the question of electronic
- communication, both on the legislative and judicial front, as well as in
- terms of media coverage.
-
- "In quick succession two laws have been approved (the first
- concerning software copyright, the second 'computer crimes') which,
- lacking all proportion, propose to punish severely - with prison
- sentences - behaviours which for the most part could best be described
- as misdemeanours. The inevitable consequence of this approach can only
- be a re-run of the 'Italian Crackdown', an exercise that has been
- criticised even by many legal practitioners.
-
- "This climate of intimidation has been further aggravated by a
- number of decisions emanating from other quarters. On the one hand, the
- Court of Rome has decreed that bulletin boards and computer networks
- must register with the state as if they were part of the print media -
- with all the legal ramifications which follow from such registration. On
- the other hand, the Italian government announced at the beginning of the
- year that it has appointed itself fit to sit in judgement on matters of
- legislation concerning privacy and BBS (the latter decision
- unprecedented in Europe) - all this to be decided through decree,
- without any preliminary discussion in parliament.
-
- "This way of managing information aids and abets the interests
- of the few. The most trivial violations of the new laws have prompted
- dozens of newspaper articles and TV programs, with barely any reportage
- of the insitutions' efforts to impose an evermore rigid regulation of
- the electronic frontier. Conferences have been held on 'Hackers,
- terrorism, and organised crime', yet public opinion remains oblivious as
- to the details. If such links truly exist, and crimes have been
- committed, we demand that the details be made public. Or is this alarm
- simply a beat-up - a beat-up whose goal, whilst unclear, can only be a
- threat to freedom?
-
- "Furthermore, it should be noted that neither the institutions
- nor the media have ever approached the theme of new forms of
- communication in terms of guaranteeing citizens' rights. Both the
- bulletin boards and the various experiments with new forms of media
- constitute a new territory, within which positive elements of social and
- interpersonal progress, of cultural and scientific solidarity, are
- rather more pertinent than the behaviours mentioned earlier.
-
- "Neither the institutions nor the media seem to have realised
- that the emergence of the 'electronic citizen' raises legitimate
- questions of universal significance. The immediate future seems to
- promise instead the negation of this form of citizenship rights, through
- the further introduction of new norms and bureaucratic procedures
- designed to limit the socialisation of information.
-
- "Since we are convinced that this issue raises questions
- pertinent to the civil liberties of all, we call upon not only the
- various computer network communities, but all members of society to
- express themselves concretely on the matter.
-
- "We note with pleasure the success of this first national
- conference in defence of amateur computer networks. Since we anticipate
- a lively debate - both within these networks and outside them - around
- the role of new information technologies in our society, we extend an
- invitation to a second common moment of reflection and mobilisation to
- be held early September in Rome."
-
- sTRANO nETWORK communication work group
-
-
-
- BITs Against The Empire Labs CyberNet 65:1400/1 +39-464-435189
- Underground Research & Documentation ECN 45:1917/2 +39-11-6507540
- Italy Fidonet 2:333/412 +39-464-435189
-
- ------------------------------
-
- Date: Sun, 26 Feb 1995 22:51:01 CDT
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 8--Cu Digest Header Info (unchanged since 26 Feb, 1995)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB <your name>
- Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- In ITALY: Bits against the Empire BBS: +39-461-980493
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
- ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu:80/~cudigest
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #7.16
- ************************************
-
-
-