home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun Jun 4, 1995 Volume 7 : Issue 45
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Tibia Editor: Who built the Seven Towers of Thebes?
-
- CONTENTS, #7.45 (Sun, Jun 4, 1995)
-
- File 1--(fwd) Christian American article on Pornography Online
- File 2--Ban Nothing, Question Everything (Eye Reprint)(fwd)
- File 3--Some Questions for Canter and Siegel in re Their Book
- File 4--Student Loses Scholarship. We All Lose A Little Freedom
- File 5--Library of Congress Signs Nat'l Dig Library Fed Agreement
- File 6--Cu Digest Header Info (unchanged since 19 Apr, 1995)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Fri, 19 May 1995 20:12:10 -0500 (CDT)
- From: David Smith <bladex@BGA.COM>
- Subject: File 1--(fwd) Christian American article on Pornography Online
-
- CHRISTIAN AMERICAN
-
- MAY/JUNE 1995
-
- TECHNO-PREDATORS Computer Porn Invades Homes
-
- Editor's note: Pornography victimizes women and entices young people.
- This article contains graphic information about the growing
- availability of pornographic pictures via computer bulletin boards
- and the Internet. Christian American hopes this information will be
- useful to parents and others who wish to safeguard their computers
- from this growing threat.
-
- By Jeffrey M. Peyton
-
- Youth pastor Tim McNabb used to love browsing through the Internet, a
- world-wide computer network, in search of electronic "pen pals."
-
- "I've had some of the most stimulating theological discussions ever
- with some people on the net," he said. "But more and more, I was
- having to wade through so much garbage to find someone who really
- wanted to talk."
-
- One day McNabb was having a theological conversation with a young
- woman who kept trying to turn the conversation in a
- sexually-suggestive direction. McNabb, who is married with children,
- was shocked. "It turns out she was only 16," he said. "I couldn't
- believe it."
-
- McNabb experienced a mild form of what some Internet veterans know as
- cybersex, the electronic equivalent to talking dirty on the telephone.
- Today McNabb, one of an estimated 30 million people dialing in from
- his home computer, accesses Internet only when he has to, and his
- communications software at home is password-protected.
-
- Unfortunately, the experience that shocked McNabb is tame compared to
- some material available on commercial dial-in bulletin boards and,
- worse, free and easily through the Internet. Today, all anyone needs
- to access hard-core pornographic photos is a computer, a modem and a
- phone jack.
-
- The technology revolution has led to a sudden explosion in illegal,
- obscene pornography distribution - all right under the noses of law
- enforcement and, in some cases, parents who unknowingly have given
- their children the ability to access such information.
-
- "Right now, people are operating in 'ignorant' mode," said Donna Rice
- Hughes of Enough is Enough, a national organization dedicated to
- stopping pornography. "They have no idea what's happening."
-
- Increasingly, porn purveyors are re-distributing photographs through
- "home pages" on Internet's world-wide web. This material is free for
- anyone who knows where to look.
-
- (Internet's public network is called a web because Internet forms an
- electronic "web" connecting computers in cities around the world. If
- one computer on the web is unavailable, information is re-routed
- though another computer via the web. The home page, literally a
- computer's address on the web, is the graphic equivalent to turning
- the page of an electronic magazine.)
-
- Some porno pages on the web deal mostly with pin-ups, along the lines
- of Sports Illustrated's swimsuit issue, but most offer images far more
- disturbing. These photographs can be copied to computer disks or
- printed on paper and permanently kept by the user or shared with
- friends.
-
- "Children can dial into the system and download anything," Hughes
- said. "It's all available, subdivided into specific sections."
-
- Illegal pornographic images are available to anyone with the right
- computer equipment. Of particular concern to parents is the rampant
- availability of legal pornography, since the law distinguishes between
- pornography, which may be legal, and obscenity, which is illegal.
-
- And, Special Agent Ken Lanning of the FBI's Behavioral Sciences Unit
- told the Associated Press, "as computers become less expensive, more
- sophisticated and easier to operate, the potential for abuse
- increases."
-
- In order to test how easily accessible porn is to computer users, a
- Christian American reporter accessed several menu selections arranged
- by subject. Topics included bestiality (sex with animals),
- torture/mutilation, snuff (killing a victim after sexually assaulting
- her) and child pornography. Categories are sub-organized for
- convenience - images under bestiality, for instance, are subdivided by
- type of animal. Not all topics included photographs.
-
- "This stuff would make a Hustler subscriber squirm," Hughes said.
- "There are hundreds of options. They're all easy to get, and they're
- all free for the taking."
-
- No Control
-
- Many parents feel better knowing their children are working on the
- computer rather than watching television, but at least TV offers
- control devices that can block objectionable channels. Now, with
- Internet and other computer bulletin board systems, the same child who
- is prohibited from watching MTV can see graphic sexual pictures on his
- or her personal computer.
-
- "You can see anything and talk to anybody," McNabb said.
-
- Legal Briefs
-
- Recent cybersmut incidents demonstrate that more law enforcement
- patrols are needed on the information speedway.
-
- The University of Michigan expelled a sophomore who posted email
- messages - which he claims were pure fiction - that described the
- rape, torture and murder of a classmate. The student, 20-year-old Jake
- Baker, spent 29 days in jail after authorities charged him with
- interstate transmission of a threat.
-
- "Torture is foreplay," Baker wrote in the introduction to one of his
- pieces. "Rape is romance, snuff is climax."
-
- In Fresno, Calif., in 1993, Mark Forston was convicted of sodomizing a
- 16-year-old boy he had met and lured to his home via a computer
- network. In Sacramento, William Steen was convicted on charges
- stemming from sending pornographic computer files to two 14-year-olds.
-
- National lawmakers are becoming aware of the growing need to regulate
- computer porn and are struggling for realistic ways to do it.
-
- Senators Jim Exon (D-NE) and Slade Gorton (R-WA) are sponsoring a bill
- that would curtail transmission of obscene, indecent or harassing
- telecommunications. Exon says the Baker case strengthens his belief
- that a crackdown on a growing Internet "red-light district" is needed.
-
- "When I see my 8-year-old granddaughter sitting at the computer back
- in Nebraska, and I know stuff like what this student wrote is
- available, I get upset. (Some Internet users) are trying to say
- anything goes, and I think that is wrong."
-
- No Boundaries
-
- Because no one "owns" the Internet - its very nature defies boundaries
- - many users feel there should be no limitations on what is available
- through the system. Their protests raise difficult questions about how
- Internet can be effectively policed.
-
- What community standard should apply to a forum that transcends state,
- even national, boundaries? Do laws apply based on the location of the
- server (usually a mainframe computer that provides Internet access to
- hundreds of users) or the location of the individual downloading
- information?
-
- For instance, in June 1994, Robert and Carleen Thomas, operators of an
- "adult bulletin board service" in California, were convicted in U.S.
- court in Memphis, Tenn., on obscenity charges because of images
- downloaded in Tennessee.
-
- Tens of thousands of Internet users have emailed petitions denouncing
- the Exon bill to Capitol Hill and the White House, claiming that any
- attempt to regulate the information super highway would be paramount
- to regulating free speech.
-
- Robert Knight, cultural studies director for the Family Research
- Council, told the Washington Times that such doomsday wailing misses
- the point.
-
- "Obscene materials are not protected, no matter what the method of
- transmission," Knight said. "The point is not to go after the
- Internet, but to begin enforcing laws against obscene materials.
-
- "If child pornography pictures are transmitted by Internet or by U.S.
- mail, it shouldn't make any difference in terms of enforcement."
-
- To encourage your senators to support the Exon-Gorton measure to curb
- computer porn, write to them at the U.S. Senate, Washington D.C.
- 20510. Or call the Capitol switchboard and ask for your senator: (202)
- 224-3121.
-
- For more information on computer pornography and what you can do to
- safeguard your home, write to Enough is Enough! at P.O. Box 888,
- Fairfax, Va. 22030, or call (703) 278-8343.
-
- Copyright =A91995 by The Christian Coalition of this page and all
- contents. All Rights Reserved.
-
- ------------------------------
-
- Date: Fri, 26 May 1995 22:02:56 -0500 (CDT)
- From: David Smith <bladex@BGA.COM>
- Subject: File 2--Ban Nothing, Question Everything (Eye Reprint)(fwd)
-
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- eye WEEKLY May 25 1995
- Toronto's arts newspaper .....free every Thursday
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- EYENET EYENET
-
- BAN NOTHING
- Question everything
-
- by
- K.K. CAMPBELL
-
-
- I was on CBC Newsworld's Faceoff two Tuesdays ago (May 16). Topic:
- censorship on the net. My opponent was Bernie Farber of the Canadian
- Jewish Congress. Take a wild guess which side I took ...
-
- The forces of censorship are amassing and, I hate to say it, if Canada
- maintains its traditions, we're doomed. The term net.cop will have a
- more real meaning than it does today.
-
- Our saving grace might be the U.S. If the U.S. abides by its own
- tradition of banning very little speech, Canucks will always be able to
- get an account in the U.S. and thus maintain our voices. While the
- net.illiterate assholes on Parliament Hill play Emperor For A Day,
- citizens will telnet across the border and publish whatever they want,
- from American computers.
-
- Here are the main three points I tried to make on the show:
-
- DIGITAL BOOK BURNERS
-
- Farber and his ilk are the moral descendants of book burners. But
- because books and printed matter have much stronger legal protections,
- The Modern Inquisition finds it easier to target CPUs and sysadmins.
-
- Right now, the panic-mongers in government and the media blame just
- about every social ill on the net. But the main theme today is bombs:
- "You can learn how to make bombs from reading the net! This evil must
- stop!"
-
- It's somewhat true. There is a file called The Terrorist's Handbook
- which circulates cyberspace. (It has a real wanky "WareZ d00d" feel to
- it and I wouldn't trust it for a second.) There's also The Anarchist's
- Cookbook making the rounds, which details everything from blowing up
- suspension bridges to cooking LSD in your kitchen. (Regard it with the
- same suspicion.)
-
- Sure enough, when I arrived at CBC studios, I saw that Farber had a
- printout of one of these text files.
-
- It was a good thing I had walked over to the World's Biggest Bookstore
- on my lunch hour and bought a copy of The Anarchist's Cookbook for
- $34.75. Information on bomb building. Right off the shelf.
-
- "Ah, but that costs money," the pro-censorship forces would counter.
- "You can copy it off the net for free.
-
- Anticipating that objection, I strolled over to the Metro Reference
- Library last Saturday. There, on the main floor, sat a horrible
- collection of terrorist information: the Encyclopedia Britannica. I
- grabbed volume 21 (right off the shelf), flipped to page 323 and read
- the section on explosives. I photocopied it for about a buck and
- strolled back out with the detailed description of how to make an
- ammonium nitrate fuel oil bomb -- exactly like that used in the
- Oklahoma City bombing.
-
- I hope Allan Rock and the feds attend to this outrage immediately and
- write legislation to regulate these damn libraries.
-
- FIGHT SPEECH WITH SPEECH, NOT COPS
-
- Farber kept suggesting that Nazis and hatemongers are using the net as
- a propaganda tool. This is uninformed opinion of the first order. The
- net is terrible as a "propaganda tool" because it's a two-way medium.
- Newsgroups are interactive. Racists are forced to answer questions.
- When Farber says, "Millions of people see what these people write,"
- complete the image for him: "Millions of people see these people
- ridiculed and humiliated in intellectual debate over and over again."
-
- That is pretty ineffective propaganda.
-
- In the finest of anarchist traditions, the net.community naturally
- produces people who rebut every hate-mongering pamphlet that denies the
- Holocaust happened. Canada's Ken McVay is one famous example. He's
- built an enormous reservoir of historical documents that permanently
- shred the revisionist pamphlets. Every time the same old pamphlets are
- uploaded to cyberspace, someone quickly tags on the real story.
-
- "And that's the beauty of the Internet: once it's refuted in an honest
- and academic fashion, you can't run away from it," McVay says. "The
- most intellectual among them (revisionists) are stupid and completely
- inept when it comes to historical research. And, of course, they are
- liars. That being the case, why on Earth would anyone want to shut them
- up or force them underground? I want to know who I'm dealing with. I
- want to know where they are. And I want to know how their minds work."
-
- It's dramatic to watch. No need for Thought Cops. As Deborah Lipstadt
- writes in Denying The Holocaust: "The main shortcoming of legal
- restraints is that they transform the deniers into martyrs on the altar
- of free speech."
-
- CENSORSHIP SUPPORTS THE STATUS QUO
-
- Throughout history, censorship has only worked to uphold the status
- quo. It keeps the strong strong and the weak weak.
-
- In 1871, Prussia's "personal honor" laws were intended to prevent
- insults against groups, such as Jews. Not surprisingly, the courts
- never upheld them for Jews, but rigorously used them to prevent
- criticism of Prussians, clerics and the military -- the status quo.
-
- At the turn of the century, France never charged the anti-Semitic
- enemies of Captain Alfred Dreyfuss. Of course, when Emile Zola wrote
- his famous tract "J'Accuse," he was charged with libel against the
- clergy and had to flee to England.
-
- In 1965, the British Race Relations Act was passed to combat racism.
- The first people charged under it? Black Power leaders, labor leaders,
- no-nuke activists. Britain's National Front thrives.
-
- In 1974, Britain's National Union of Students passed a resolution
- against "openly racist and fascist organizations." It was designed
- specifically to prevent anti- Semitism. A year later, it was invoked to
- prevent Israeli/Zionist speakers from touring. The National Front was
- delighted.
-
- Think all this is ancient history? How about Canada's infamous 1992
- Supreme Court decision in "Butler vs. the Queen"? It was hailed by
- pro-censorship feminists like Andrea Dworkin and Catherine MacKinnon as
- being a great step forward for women in the "battle" against sexual
- images.
-
- Two-and-a-half years later, we find that it has been used by the
- authorities to seize and confiscate material from well over half of all
- the feminist bookstores across the country. In fact, Customs actually
- seized two of Dworkin's own books. It was also used against gays and
- lesbians. "Traditional" sexual material was never touched.
-
- When are people who work for change going to learn that when they
- support censorship, they are building their own gallows? If they want
- to change society, why are they working to transfer still greater
- powers to the state? If they believe in change, they simply cannot
- support censorship.
-
- The Master's tools will never dismantle the Master's house.
-
-
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Retransmit freely in cyberspace Author holds standard copyright
- http://www.interlog.com/eye Mailing list available
- eyeNET archive --> http://www.interlog.com/eye/News/Eyenet/Eyenet.html
- eye@interlog.com "...Break the Gutenberg Lock..." 416-971-8421
-
- ------------------------------
-
- Date: Sat, 3 Jun 1995 21:13:56 CDT
- From: Jim Thomas <cudigest@sun.soci.niu.edu>
- Subject: File 3--Some Questions for Canter and Siegel in re Their Book
-
- ((MODERATORS' NOTE: Canter and Siegel are best known for "spamming the
- nets" with the infamous 1994 "Green Card" advertisement that was sent to
- thousands of newsgroups and mailing lists. Then, they wrote a book
- lauding the spam practice, and claimed that fortunes were waiting to
- be made on the Internet. CuD was the victim of their spam, although
- the quick action of gatemeister Chip Rosenthal minimized the damage.
- Within the next week, CuD will run a special issue on Canter and
- Siegel, including a review of their "How to Make a Fortune on the
- Information Superhighway," which is billed as a "Guerrilla Guide." The
- book is a rather confusing mixture of self-serving commentary,
- mean-spirited attacks on their critics, sloppy thinking, and gross
- errors. Before completing the review, I thought I would provide
- Canter and Siegel the opportunity to clarify a few questions I had
- after reading it)).
-
- ===========================
-
- 2 June, 1995
-
- TO: Laurence A. Canter and Martha S. Siegel
-
- FROM: Jim Thomas
-
- RE: Help me Understand Your Book
-
- Please help me. I am doing a review of your book, _How to Make a
- FORTUNE on the Information Superhighway: Everyone's Guerrilla Guide
- to Marketing on the Internet and Other On-line Services_, which will
- be part of a special issue on you both in Cu Digest within the next
- week. To help me assure accuracy in writing my review, perhaps you
- could answer some questions I have now that I've carefully read,
- line-by-line, the full 234 pages of your tome. I have found so many
- confusing and illogical passages, gross errors that suggest a
- "fictional work adapted from a true story," and sloppy thinking and
- writing, that I am wondering if it was intended as a Swiftian satire.
- Here are a few examples that I found curious:
-
- 1. On page 190 of your volume, you strongly suggest that Michael
- LaMacchia, an MIT student, was indicted for software piracy. You
- write:
-
- "Still, one thing does seem to be typical of many hackers,
- they don't care about breaking the law. The two most famous
- examples of this are Craig Neidorf and Michael La Macchia.
- Neidorf went down in the annals of hacker fame for stealing
- a program that detailed the operations of Bell South's
- emergency 911 telephone system. For this Neidorf was
- arrested and convicted, although he received only a year's
- probation as punishment."
-
- It is not that you grossly err in identifying these two individuals as
- "hackers" or as "famous examples" of cyber-criminals who "don't care
- about breaking the law." This I attribute to simple ignorance and
- cavalier indifference to fact. My concern is with your falsehoods.
- Because you identify yourself as competent, credentialed, credible
- professionals, and because you seem to pride yourself on "being
- right," perhaps you could provide the source for the above claims.
- Those who have read the the indictment in the LaMacchia case,
- which as practicing attorneys I assume you would before making
- your claims, are aware that LaMaccia was not indicted for
- piracy. I wonder if you are also aware that the federal judge
- dismissed the charges against LaMacchia. My question: On what
- basis do you proclaim LaMacchia a "famous example" of law-breaking
- when he was not so-judged by the court?
-
- More serious are your allegations against Craig Neidorf. You
- explicitly claim that "NEIDORF WENT DOWN IN THE ANNALS OF HACKER FAME
- FOR STEALING A PROGRAM THAT DETAILED THE OPERATIONS OF BELL SOUTH'S
- EMERGENCY E911 TELEPHONE SYSTEM ((emphasis added))." For this,
- you say, HE WAS CONVICTED.
-
- There are several fundamental errors in this short passage. First, a
- "program" was not at issue in the case. Second, Neidorf was not
- brought to trial for theft, as even a cursory review of his indictment
- (or even media accounts) would reveal. Third, Neidorf was not only
- NOT convicted, but the prosecution withdrew the charges even before it
- concluded presenting its case. It had no case. Fourth, there was no
- evidence adduced in court, nor am I aware of even anecdotal
- information, to indicate that Neidorf was a "hacker." He published a
- newsletter ABOUT hackers, a small, but hardly an inconsequential
- detail, as a federal prosecutor learned in a humiliating experience
- with a botched prosecution.
-
- My questions: 1) Does such a statement, which publicly defames Craig
- Neidorf, constitute an intentional lie, astonishing intellectual
- sloppiness, or simply an indifference to truth? 2) Are you prepared
- to publicly apologize to Craig Neidorf for this reckless comment that
- some might argue is libelous? 3) Are you willing to publicly recant
- that passage now that you have been corrected, or will you insist on
- letting such a defamatory smear stand? If you wish to read the
- indictments and other related legal documents and commentary, you can
- find them in the back issues of Cu Digest.
-
- 2) In reading your book, I had the feeling that I was reading a
- 234 page match-book cover: "MAKE A FORTUNE IN YOUR SPARE TIME--tear
- the cover off, send it in...."--Chapter headings and passages allude
- ad nauseam to "making a fortune," "getting rich," and "making money."
- My question: Are you as hopelessly driven by the mercenary spirit in
- real life as the book suggests, or does the subtext of your book
- reflect merely an ironic satire on shameless amoralism and the
- disingenuousness of advertising and consumerism that you practice?
-
- 3) You seem not to like people on the net very much. Despite the
- occasional caveat, your work (as the title would corroborate) seems an
- indiscriminate assault on all those who inhabit "cyberspace." You make
- sweeping generalizations about the "Net society," "Net participants,"
- and the "Net community," in which your invective includes so many
- pejorative terms that I stopped counting. Geeks is the mildest. My
- question: Is it good business practice to offend the community in which
- you're trying to make a buck?
-
- 4) Nowhere in your book did you demonstrate that you understood why
- the response to your advertising gimmick, called "spamming,"
- infuriated people. In fact, you seemed not only surprised, but angry
- that people would react against indiscriminate flooding of Usenet,
- Bitnet, and other Newsgroups, as well as mailboxes, with repititious
- advertisements. Indeed, you seem proud to the point of boastful that
- you spammed the net, and unless you were speaking in some primitive
- code, it seemed clear that you were advocating to others that they do
- likewise to make a fortune. Further, you conflate "spamming" and
- "advertising," assuming that the ill-will you raised was soley due to
- violation of an advertising taboo. Did I misread, or do you really not
- understand the implications of flooding newsgroups and mailboxes with
- millions of identical posts? Nowhere, not in a single line, did I
- find even a hint that you saw such an action as--at the least--rude.
- Quite the contrary--you write as if it's your right to be uncivil
- boors, while criticizing your victims when they complain of your
- predation. My question: Did you ever take an ethics course? If so,
- did you pass?
-
- 5) I have tried to drop you a note (to the address listed in your book
- and to the contact identified as "Laurence A. Canter" at
- postmaster@cyber.sell.com on the information provided through Unix's
- nslookup). Using a variety of Unix programs (mail, ping, nslookup,
- whois, traceroute, and others), It appears that cyber.sell.com is down
- or otherwise unreachable. Perhaps this is merely a momentary glitch,
- perhaps not. My question: Do you have net access, or do you not? If
- not, is it because your "spamming" strategy has so discredited you
- that you are unable to find a reputable provider?
-
- 6) You claim that you are being "censored" by "cancelbots" which have
- been designed to identify and cancel posts that are identical and that
- are distributed to numerous newsgroups at once. As attorneys, I'm
- surprised that you seem not to understand the meaning of the term
- "censorship." You label those who engage in and support cancelbots as
- "hypocrites" and worse. My questions: 1) Are you really unaware that
- spamming is opposed by the overwhelming majority of the net? 2) Do you
- really not know that those opposing spamming do so because spamming is
- disruptive to systems and individual users? 3) Do you really not know
- that most system administrators support cancelbots? 4) Are you really
- unaware that cancelbots are not content-driven, but distribution
- driven? 5) Are you being disingenuous or merely ignorant when you feel
- that it is your "right" (as you repeatedly claim) to advertise as you
- wish (as long as you violate no statutes), while simultaneously
- complaining when others exercise their right of speech to communicate
- to you their displeasure with your disruptive behavior?
-
- 7) You argue in your conclusion that you are pioneers and you believe
- that you are paving the way for others. Paving the way for what?
- Certainly not for net advertising or commercialism, which has long
- been a fact of net life, and is recognized by most of us as a valuable
- enrichment of the net. The homepages of the publishing and music
- industry are just two examples of how information and commercialism
- can be productively integrated. After reading your book with great
- care, I can only conclude that your own "pioneer" effort has been the
- advocacy of spamming. But, this is a minor issue. What troubles me is
- that, while stating that you are pioneers, both the mood and the text
- of your book suggest a different metaphor, that suggested in your
- subtitle: "EVERYONE'S GUERRILLA GUIDE TO MARKETING." The term
- "guerrilla" denotes small bands of militants who harass an enemy with
- destructive acts for the purpose of driving the enemy from the field.
- The term connotes a state of war in which the guerrilla aims to hurt
- the adversary. My question: Do you honestly believe that "guerrilla
- warfare" is a sound commercial strategy, or is this more satire by
- which you poke fun at net-hucksters, unethical advertising tactics,
- and destructive behavior?
-
- 8) Throughout your book, you demonstrate a disregard for common
- courtesy and display what I interpret as a Nietzschean ethical
- relativism. To your readers who might traverse the internet to
- seek their fortune, you advise:
-
- Along your journey, someone may try to tell you
- that in order to be a good Net "citizen," you must
- follow the rules of the cyberspace community. Don't
- listen. The only laws and rules with which you
- should concern yourself are those passed by the
- country, state, and city in which you truly live.
- The only ethics you should adopt as you pursue wealth on the
- I-way are those dictated by the religious faith you have chosen
- to follow and your own good conscience (p. 12).
-
- You scoff at Usenet's (and other) "Netiquette rules" for posting, and
- call it dogma (p. 200). You add:
-
- Of the supposed moral issue, there is little left to be
- said. Making money on the Internet in whatever way seems
- best to you is not a moral question as long as you conduct
- yourself with basic honesty and obey the law (p 207).
-
- In all societies, there are norms of basic etiquette. Participating in
- an electronic forum doesn't change normative expectations of
- participants. You seem not to know that legality is not necessarily a
- sufficient criterion for appropriate behavior in civilized society.
- More to the point is the bald disingenuousness of your rather facile
- rationalization for engaging in disruptive behavior. After decrying
- electronic vandals, rudeness, and "crime," you seem to glorify and
- advocate many of those same acts. For example, even while claiming
- that one's mailbox is not a public forum, you defend junkmail,
- comparing it to unsolicited advertising delivered by the postal
- service. Do you not understand that, for those computer users who are
- charged by the message, by the space used for file storage, or for
- on-line time, that the costs of junk mail are passed on to the
- consumer? Are you really so ignorant of how the web operates that you
- believe that your spam is limited to Usenet news groups? Are you so
- completely ignorant of the medium you profess to know that you are
- unaware that much of spam winds up in others' mailboxes instead of
- newsgroups? Do you really not know how much space can be wasted, how
- disruptive your posts are to some systems, and how aggravating it is
- especially for non-Usenet users when spamming occurs? It will
- eventually be for the courts to determine whether such disruptive,
- costly, and resource-draining behaviors such as yours are illegal. A
- case could be made that you are nothing more than electronic "Vandals"
- intent on sacking the net with admitted guerrilla tactics. However,
- in your defense, I offer that perhaps your history education is
- sufficiently incomplete that you confuse "pioneers" with "Vandals"."
- From my reading of your book, there is little to support your
- identification with the former, and much with the latter.
-
- But, a metaphoric quibble isn't my point. It's this: You claim on one
- hand that you have not broken any laws. You also claim to find
- "hacker" activity abhorrent. Yet, you arguably are as willing to
- violate legal norms as those "hackers" you ridicule. Your spam didn't
- simply flood Usenet newsgroups. You targeted academic groups as well,
- and your indiscriminate posting, which you defend and glorify, flooded
- some mailboxes. This is merely the behavior of a Vandal. To reach some
- of those posters, you had to "hack" your way into private, moderated
- lists. You had to circumvent established procedures to trespass where
- you were neither wanted nor invited. In short, to reach some lists you
- did more than post to a public forum---you crashed into private spaces
- through trickery. It is not just that you trespassed into private
- domains, it is that you defend this costly and disruptive practice and
- then wonder why others are bothered by your behavior. My question is
- this: Why are you so sure that your own behaviors and those you
- advocate are within the law?
-
- I look forward to your answers to these questions so that I may
- complete my review of your work as objectively as possible. Of
- course, because you do not know me, you may not with to respond. Let
- me introduce myself:
-
- My name is Jim Thomas. I am an academic who has been on the nets for
- over a decade. I subscribe to several dozen Usenet groups, virtually
- all of which were hit by your spam. These were deleted easily enough.
- I subscribe to a dozen highly specialized academic Bitnet discussion
- groups. These posts arrive in my personal mailbox. Your spam cluttered
- my box and caused me delays and other consequences. I edit an
- electronic, moderated, newsgroup, Cu Digest (or CuD). This group does
- not accept public posts. Posts sent to the group do not go to the
- group, but to me. In order to post to the group without permission,
- one must "hack" the address. Three times in the past year, spam that
- was publicly attributed to you--the Green Card, about which you brag,
- a "get out of debt" spam that was identified from the return route as
- originating from cyber.sell.com, and a recent health book
- advertisement that the "clients" claim was initiated by "Canter and
- Siegel who wrote that book"--was hacked into this group. That you
- found a way to automate trespassing makes it no-less acceptable. Is
- it illegal? Perhaps, perhaps not. But, if you are counselling your
- clients to trespass in order to "make their fortune on the Internet,"
- as both your words and deeds indicate, then I do have to wonder about
- the private ethics that you hold up as the model of good conscience.
-
- After reading your volume and being a victim of your actions, I am
- saddened that, for me, the best single adjective that fits your
- behavior and the intellectual tone of the volume is: dishonest.
-
- ------------------------------
-
- Date: Fri, 2 Jun 1995 18:54:26 -0400
- From: Matthew Saroff <msaroff@MOOSE.ERIE.NET>
- Subject: File 4--Student Loses Scholarship. We All Lose A Little Freedom
-
- (Originally from: comp-academic-freedom-talk@EFF.ORG
- (comp-academic-freedom-talk mailing list)
-
- Student Loses Scholarship. We All Lose A Little Freedom
-
- by Jim Crawley, editor
- -----------------------------------------------------------
-
- Paul Kim may be the first person ever to have his own home page on the
- World Wide Web censored. The 17-year-old high school senior lost his
- National Merit scholarship, possibly admission to Harvard and his
- satirical Web page.
-
- Earlier this year, the Bellevue, Wash., student created an "Unofficial
- Newport High School Home Page" on his home computer and posted it in a
- public directory of his Internet provider, according to a recent
- article in the Seattle Post-Intelligencer. He also submitted the page
- to the Yahoo directory.
-
- Included under a category about students' likes, Kim provided links to
- three other servers that had a Playboy centerfold, an article about
- masturbation and another about oral sex, the paper reported.
-
- "I put a satire of the school on the Internet as a joke," Kim told a
- reporter.
-
- The page was noticed by a staff member at another Bellevue school, who
- reported it to Newport High officials. Their response was to withdraw
- the school's endorsement of Kim's National Merit scholarship -- he has
- a 3.88 grade point average and posted a near perfect score on the SAT.
- He automatically lost the $2,000 scholarship. Then, the principal sent
- faxes to the seven top-rank colleges that Kim applied to. Soon,
- afterwards, Harvard rejected his application.
-
- While Kim and attorneys from the ACLU are asking the school district
- for $2,000 and a public explanation of the school officials'
- "violation of Kim's free-speech rights," the school hasn't paid up nor
- showed signs it will.
-
- The scary part of this story -- other than it's true -- is that it's
- only the beginning of a trend.
-
- You don't need to be a soothsayer to predict that other schools,
- Internet providers or companies will try to determine what is
- appropriate content. It's already happened.
-
- But, the Kim case is the first time a government entity has censured
- (and censored) someone for publishing a Web page on a non-government
- computer. And, if unchecked and uncorrected, it sets a horrific
- impediment on the Web and its development.
-
- While a person's home is their castle (please note the WEBster's
- gender neutrality), a person's home page may not be safe. As the Web
- grows into a full-fledged, powerful replacement for some forms of the
- printed word, Web publishers must be assured that they are protected
- by the First Amendment.
-
- So far, freedom of the press doesn't cover publications that are based
- entirely on recycled electrons. If that lapse continues much longer,
- more and more bureaucrats, legislators and demagogues will try (and
- succeed) to censor the Web.
-
- And, then no one will be laughing.
-
- ------------------------------
-
- Date: Fri, 2 Jun 95 16:37:41 EST
- From: "Rhea Zimbar" <rzim@LOC.GOV>
- Subject: File 5--Library of Congress Signs Nat'l Dig Library Fed Agreement
-
- May 24, 1995
- Contact: Guy Lamolinara (202) 707-9217
-
- LIBRARY OF CONGRESS SIGNS
- NATIONAL DIGITAL LIBRARY FEDERATION AGREEMENT
-
-
- The Librarian of Congress, James H. Billington, the
- Commission on Preservation and Access and officials from 14 other
- research libraries and archives on May 1 signed the National
- Digital Library Federation Agreement.
- Recognizing "the important leadership role that the Library
- of Congress has played in raising as a national issue the need
- for such a national digital library," those institutions taking
- part agreed to "bring together -- from across the nation and
- beyond -- digitized materials that will be made accessible to
- students, scholars and citizens everywhere."
- "The Library of Congress is proud to be a member of the
- National Digital Library Federation and to continue its
- leadership role in building a collection of digitized materials
- that will bring unique materials reflecting America's heritage
- and culture to all," said Dr. Billington.
- The Commission on Preservation and Access, whose president
- is Deanna B. Marcum, is a private, nonprofit organization. Its
- mission is to develop and support collaboration among libraries
- and allied institutions to ensure access to and preservation of
- resources in all formats.
- At the signing, held at Harvard University, participants
- agreed to establish a collaborative management structure, develop a
- coordinated approach to fund-raising and formulate selection guidelines
- that will "ensure conformance to the general theme of U.S. heritage and
- culture." "The Library of Congress and the scholarly community will
- benefit from participation in the National Digital Library
- Federation, particularly by working with the federation members
- to increase access to the nation's research collections in
- libraries and archives both large and small," said Winston Tabb,
- Associate Librarian for Collections Services.
- In addition to the Library of Congress, and the Commission
- on Preservation and Access, those institutions signing the
- agreement are: Columbia University, Cornell University, Emory
- University, Harvard University, National Archives and Records
- Administration, New York Public Library, Pennsylvania State
- University, Princeton University, Stanford University, University
- of California at Berkeley, University of Michigan, University of
- Southern California, and University of Tennessee and Yale
- University.
-
- ------------------------------
-
- Date: Sun, 19 Apr 1995 22:51:01 CDT
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 6--Cu Digest Header Info (unchanged since 19 Apr, 1995)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CUDIGEST <your name>
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: Bits against the Empire BBS: +39-464-435189
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
- ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu:80/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #7.45
- ************************************
-