home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun Jul 23, 1995 Volume 7 : Issue 62
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
-
- CONTENTS, #7.62 (Sun, Jul 23, 1995)
-
- File 1--Cincinnati BBS Raids Indictment
- File 2--Kyl and Leahy to Introduce Anti-Hacker Bill
- File 3--Computer Porn Conviction: New Thought Control (fwd)
- File 4--"Computer Privacy Handbook" by Bacard
- File 5--Cu Digest Header Info (unchanged since 19 Apr, 1995)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Sat, 22 Jul 1995 09:23:01 PDT
- From: Paul J. Ste. Marie <pstemari@well.sf.ca.us>
- Subject: File 1--Cincinnati BBS Raids Indictment
-
- ((MODERATORS' NOTE: The Cincinnati BBS raids strike us a witch hunts.
- The following document gives us no reason to change our minds. The
- raids seem consistent with the current mood of some prosecutors,
- politicians, and others, to ride the "anti-porn" hysteria).
-
- 0024573
- Plaintiff
-
-
- UNITED STATES DISTRICT COURT
- SOUTHERN DISTRICT OF OHIO
- WESTERN DIVISION
-
-
- BOB EMERSON
- d/b/a, Cincinnati Computer CASE NO.
- Connection,
- 4466 Dogwood Drive
- Batavia, Ohio 45103,
-
- Plaintiff,
-
- vs.
-
-
-
- SIMON L. LEIS, JR.
- Hamilton County Justice Center
- 1000 Sycamore
- Cincinnati, Ohio 45202
-
- HAMILTON COUNTY SHERIFF'S
- DEPARTMENT COMPLAINT AND
- Hamilton County Justice Center JURY DEMAND
- 1000 Sycamore
- Cincinnati, Ohio 45202
-
- HAMILTON COUNTY REGIONAL
- COMPUTER CRIMES TASK FORCE
- Hamilton County Justice Center
- 1000 Sycamore
- Cincinnati, Ohio 45202
-
- UNION TOWNSHIP POLICE
- DEPARTMENT, A Division Of The
- Public Safety Department Of Union
- Township, Ohio
- 4312 Gleneste-Withamsville Road
- Cincinnati, Ohio 45245
-
- CINCINNATI POLICE
- DEPARTMENT, A Division Of The
- Public Safety Department Of The
- City Of Cincinnati
- c/o Division 5
- 1012 Ludlow Avenue
- Cincinnati, Ohio 45202
-
- MICHAEL BURNS
- 4312 Gleneste-Withamsville Road
- Cincinnati, Ohio 45245
-
- MICHAEL SNOWDEN
- c/o Division 5
- 1012 Ludlow Avenue
- Cincinnati, Ohio 45202
-
- DALE MENKAUS
- Hamilton County Justice Center
- 1000 Sycamore
- Cincinnati, Ohio 45202
-
- DETECTIVE SWISSHELM
- Hamilton County Justice Center
- 1000 Sycamore
- Cincinnati, Ohio 45202
-
- JANE/JOHN DOES
- Law Enforcement Officers
- Addresses Currently Unknown
-
- Defendants.
-
-
-
- Now comes plaintiff, Bob Emerson, d/b/a Cincinnati Computer
- Connection who for its complaint against defendants, states as
- follows
-
-
-
- PRELIMINARY STATEMENT
-
- 1. This is an action under the laws and Constitution of
- the United States alleging that state law enforcement officials
- from various jurisdictions in Southwest Ohio and Northern Ken
- tucky acting in concert as part of a "Regional Computer Crimes
- Task Force," unlawfully and unconstitutionally seized computer
- equipment, files, and communications in furtherance of a campaign
- to impose a prior restraint on the computer transmission of non-
- obscene adult oriented forms of expression presumptively
- protected by the First Amendment to the United States
- Constitution.
-
-
-
- JURISDICTION
-
- 1. Jurisdiction is conferred upon this Court by 18 U.S.C.
- 2707, 28 U.S.C. 1331, 28 U.S.C. 1343, 28 U.S.C. 2201, 28
- U.S.C. 2202, 42 U.S.C. 1983, 42 U.S.C. 1985, 42 U.S.C
- 1988, and 42 U.S.C. 2000aa.
-
- 2. This is a suit authorized by law to redress
- deprivations under color of state law of rights, privileges, and
- immunities secured by the First, Fourth and Fourteenth Amendments
- to the United States Constitution, the First Amendment Privacy
- Protection Act, and Title II of the Electronic Communications
- Privacy Act.
-
- 3. Venue in this Court is appropriate as the various acts
- complained of occurred within the Western Division of the
- Southern District of Ohio.
-
-
- PARTIES
-
- 4. Plaintiff Bob Emerson, an individual who resides at
- 4466 Dogwood Drive, Batavia, Ohio 45103, owns and operates a for-
- profit electronic computer bulletin board system known as
- Cincinnati Computer Connection (hereinafter "CCC").
-
- 5. Defendant, Simon L. Leis, Jr., is and was at all times
- referred to herein the Sheriff of Hamilton County, Ohio. He is
- sued in both his personal and official capacities.
-
- 6. Defendant, Hamilton County Sheriff's Department, is a
- sheriff's department organized under the laws of the State of
- Ohio.
-
- 7. Defendant, Hamilton County Regional Computer Crimes
- Task Force, is a branch of the Hamilton County Sheriff's
- Department organized under the laws of the State of Ohio to
- utilize special skills and expertise in investigating computer
- crimes.
-
- 8. Defendant, Union Township Police Department, is a
- division of the Public Safety Department of Union Township Ohio,
- organized under the laws of the State of Ohio.
-
- 9. Defendant, Cincinnati Police Department, is a division
- of the Public Safety Department of the City of Cincinnati,
- organized under the laws of the State of Ohio.
-
- 10. Defendant, Michael Burns, is and was at all times
- referred to herein the Acting Chief of the Union Township Police
- Department in Clermont County, Ohio. He is sued in both his
- personal and official capacities.
-
- 11. Defendant, Michael Snowden, is and was at all times
- referred to herein the Chief of the Cincinnati Police Department.
- He is sued in both his personal and official capacities.
-
- 12. Defendant, Dale Menkaus, is and was at all times
- referred to herein the Commander of the Regional Computer Crimes
- Task Force. He is sued in both his personal and official
- capacities.
-
- 13. Defendant, Detective Swisshelm, is and was at all times
- referred to herein a member of the Regional Computer Crimes Task
- Force. He is sued in both his personal and official capacities.
-
- 14. Jane/John Doe, are individuals from the Regional
- Computer Crimes Task Force and/or other police departments from
- various jurisdictions whose names are currently unknown whom
- plaintiff believes conspired with defendants and participated in
- the acts against plaintiff complained of herein. Such
- individuals are sued in both their personal and official
- capacities.
-
-
- STATEMENT OF THE CASE
-
- 15. A computer bulletin board system, like CCC, stores
- information in a central computer and allows subscribers to
- access that information via telephone lines and personal computer
- equipment. By means of a computer bulletin board, subscribers
- can converse, communicate and exchange various types of
- information with each other as well as retrieve information
- stored on the bulletin board itself.
-
- 16. Plaintiff has been operating CCC since 1982 and has
- developed a list of monthly subscribers numbering in the
- thousands, who pay a set fee for access to the bulletin board.
- CCC offers its subscribers the ability to send and receive
- electronic mail (hereinafter "e-mail"), to participate in on-line
- discussion groups, to utilize and download software, to engage in
- computer games, and to receive newspapers and periodicals of
- general as well as highly specialized interest. Included among
- the various information and service options offered to
- subscribers of CCC is non-obscene adult oriented material. This
- category of material represents approximately three (3) percent
- of the total informational material and resources offered by CCC
- to its subscribers. Access to the non-obscene adult oriented
- material on the CCC bulletin board is restricted to a limited
- number of adult subscribers who requested such access.
- 17. Commencing sometime prior to June 16, 1995, defendants,
- under color of state law and pursuant to and in their official
- capacities for and on behalf of their respective jurisdictions,
- conspired together and with others unknown, and therefore not
- named as defendants, to violate plaintiff's rights and privileges
- guaranteed to him by the First, Fourth and Fourteenth Amendments
- of the United States Constitution, the First Amendment Privacy
- Protection Act, and Title II of the Electronic Communications
- Privacy Act by designing and implementing a campaign
- characterized by harassment, express and implied threats of
- criminal prosecution, and mass seizures of computer equipment and
- information. This campaign was initiated by defendants for the
- purpose of causing plaintiff, and others, to cease transmitting
- and/or receiving non-obscene adult oriented material via computer
- technology.
-
- 18. Sometime on or about June 16, 1995, pursuant to and
- part of this campaign, defendants, under color of state law,
- sought a search warrant authorizing the search of all computer
- equipment and accessories necessary for the operation of CCC and
- authorizing the wholesale and indiscriminate review of all
- computer electronic communications transmitted to and from
- plaintiff and CCC's subscribers including, but not limited to, e-
- mail and personal correspondence that was stored in or exchanged
- in electronic form by means of CCC's equipment and software. At
- the time defendants made application for the aforementioned
- search warrant, defendants knew or should have known that no
- reasonable grounds existed to believe that the contents of the e-
- mail and personal correspondence sought were relevant or material
- to any on-going criminal investigation.
- 19. On June 16, 1995, pursuant to and part of this
- campaign, defendants, under color of state law, obtained and
- executed a search warrant providing for the search of plaintiff's
- personal residence for all computer equipment and accessories
- necessary for the operation of CCC as well as for all electronic
- communications transmitted to and from CCC's subscribers
- including, but not limited to, e-mail and personal correspondence
- that was stored in or exchanged in electronic form by means of
- CCC's equipment and software.
-
- 20. As a further part of this campaign, following the
- execution of the aforementioned search warrant, defendants seized
- and physically removed from plaintiff's residence virtually the
- entire inventory of computer equipment and accessories owned by
- plaintiff and necessary for the operation of CCC. Included among
- the numerous equipment and accessories seized by defendants were
- computer hardware, video display units, printers, software, data
- drives, and internal or external information storage units. As a
- consequence of defendants' actions in removing the aforementioned
- computer equipment and accessories, defendants necessarily seized
- information transmitted to and from CCC and its subscribers,
- including, but not limited to, e-mail and correspondence stored
- or exchanged in electronic form. As a further consequence of
- these actions defendants seized plaintiff's entire inventory of
- non-obscene adult related material as well as all other forms of
- expressive material.
-
- 21. At the time defendants sought, obtained, and executed
- the aforementioned search warrant and seized all of the computer
- equipment and accessories related to the operation of CCC, as
- well as much of the information provided by CCC to its
- subscribers which was contained in such equipment, defendants
- knew or should have known
-
- i. that items seized included work product and
- documentary material containing mental impressions, conclusions
- or theories of individuals who authored or created such materials
- for the purpose of disseminating same to the public;
-
- ii. that the information seized included e-mail and
- personal correspondence transmitted to and from plaintiff and
- CCC's subscribers;
- iii. that the information seized included expressive
- material protected under the First and Fourteenth Amendments to
- the United States Constitution that cannot be seized without a
- prior judicial determination of probable obscenity;
-
- iv. that the mass seizure of this computer equipment and
- information would have a devastating impact on the plaintiff's
- business;
-
- v. that the mass seizure of this computer equipment and
- information would prevent plaintiff from transmitting any
- information, including expressive material protected under the
- First and Fourteenth Amendments to the United States
- Constitution;
-
- vi. that the search warrant under which authority
- defendants ostensibly based their actions did not by its terms
- authorize the seizure of any materials or information;
-
- vii. that there were less intrusive means of obtaining the
- information defendants sought to inspect for potential violations
- of state law, and that such means, if utilized, would have
- permitted plaintiff to continue to use and derive the economic
- benefit of his computer equipment;
-
- viii. that there were less intrusive means of obtaining
- the information defendants sought to inspect for potential
- violations of state law, and that such means, if utilized, would
- have permitted plaintiff to continue to receive and transmit
- constitutionally protected speech;
-
- ix. that there were less intrusive means of obtaining the
- information defendants sought to inspect for potential violations
- of state law, and that such means, if utilized, would have
- preserved the privacy interests of plaintiff and his subscribers
- in the e-mail and personal correspondence that was stored in or
- exchanged in electronic form via CCC's equipment and software;
- and
-
- x. that it was not necessary to physically seize and
- remove the information sought or any of the computer equipment
- owned by plaintiff because defendants at all times were capable
- of retrieving or "downloading" information exchanged or stored in
- plaintiff's computer equipment and by such means preserving said
- information for any legitimate law enforcement purpose determined
- by defendants.
- 22. Defendants' activities were conducted purposefully, in
- bad faith, in conscious and reckless disregard of plaintiff's
- federal and constitutional rights to privacy, to free speech, and
- to be free from unreasonable searches and seizures, and with the
- intention to intimidate plaintiff from his continued exercise of
- free expression and to impose a prior restraint on the
- transmission of presumptively protected forms of expression by
- plaintiff and others by permanently removing from circulation non-
- obscene adult oriented and other forms of expression and by
- physically removing and retaining the computer equipment and
- software by which computer-generated forms of expression are
- transmitted.
-
- 23. As a direct and proximate result of defendants'
- actions, as previously described, plaintiff has suffered and will
- continue to suffer damage to his business and professional
- reputation in the following regards
-
- i. plaintiff has lost the use of computer equipment
- valued at approximately $45,000.00;
-
- ii. plaintiff has been forced to replace computer equipment
- at the cost of approximately $45,000.00;
-
- iii. plaintiff has lost revenue from subscribers in the
- amount of approximately $28,000.00 per month;
-
- iv. plaintiff has suffered a temporary and permanent loss
- of a portion of his subscriber base;
-
- v. plaintiff has lost good will associated with the
- operation of a legitimate and lawful computer service; and
- vi. plaintiff has been prevented from transmitting
- presumptively protected material to his subscribers.
-
- 24. Further, unless defendants are preliminarily and
- permanently enjoined from continuing to engage in a campaign to
- intimidate plaintiff, to chill the exercise of his constitutional
- rights, and to impose a prior restraint upon the distribution of
- presumptively protected forms of expression, plaintiff will
- continue to suffer violations of his constitutional rights,
- thereby incurring irreparable injury for which plaintiff has no
- adequate remedy at law.
-
- STATEMENT OF THE CLAIM
-
- COUNT ONE
-
- 25. Paragraphs one (1) through twenty-six (26) are
- realleged as if fully rewritten.
-
- 26. The actions of defendants, as described herein,
- deprived plaintiff of his right to free speech secured by the
- First Amendment to the United States Constitution in violation of
- 42 U.S.C. 1983.
-
-
- COUNT TWO
-
- 27. Paragraphs one (1) through twenty-six (26) are
- realleged as if fully rewritten.
-
- 28. The actions of defendants, as described herein,
- deprived plaintiff of his right to be free from unreasonable
- searches and seizures secured by the Fourth Amendment of the
- United States Constitution in violation of 42 U.S.C. 1983.
-
-
- COUNT THREE
-
- 29. Paragraphs one (1) through twenty-six (26) are
- realleged as if fully rewritten.
-
- 30. The actions of defendants, as described herein,
- deprived plaintiff of his right to privacy secured by the United
- States Constitution in violation of 42 U.S.C. 1983.
-
-
- COUNT FOUR
-
- 31. Paragraphs one (1) through twenty-six (26) are
- realleged as if fully rewritten.
-
- 32. The actions of defendants, as described herein,
- deprived plaintiff of the right to be free from deprivations of
- property without due process of law as guaranteed by the
- Fourteenth Amendment of the United States Constitution in
- violation of 42 U.S.C. 1983.
-
-
- COUNT FIVE
-
- 33. Paragraphs one (1) through twenty-six (26) are
- realleged as if fully rewritten.
-
- 34. The actions of defendants, as described herein,
- deprived plaintiff of rights secured by the First Amendment
- Privacy Protection Act, 42 U.S.C. 2000aa.
-
-
- COUNT SIX
-
- 35. Paragraphs one (1) through twenty-six (26) are
- realleged as if fully rewritten.
-
- 36. The actions of defendants, as described herein,
- deprived plaintiff of rights secured by Title II of the
- Electronic Communications Privacy Act, 18 U.S.C. 2701.
-
-
- COUNT SEVEN
-
- 37. Paragraphs one (1) through twenty-six (26) are
- realleged as if fully rewritten.
-
- 38. The actions of defendants, as described herein,
- constituted an illegal conspiracy to deprive plaintiff of his
- constitutional rights in violation of 42 U.S.C. 1985(3).
-
-
- PRAYER FOR RELIEF
-
- WHEREFORE, Plaintiff Bob Emerson, d/b/a/ Cincinnati Computer
- Connection, hereby demands judgment as follows
-
- _ 1. A declaration that the actions of the defendants
- constitute a prior restraint in violation of the First and
- Fourteenth Amendments to the United States Constitution;
-
- 1. A preliminary and permanent injunction restraining,
- enjoining and prohibiting the defendants from undertaking,
- enforcing, maintaining, or adopting any policies, procedures,
- practices, campaigns, or acts against or towards plaintiff which
- constitute a prior restraint upon plaintiff's transmission of
- protected forms of expressive non-obscene adult oriented
- materials;
-
- 2. An order requiring defendants to return to plaintiff
- all computer equipment, accessories and material seized from
- plaintiff;
-
- 3. An order awarding plaintiff compensatory damages for
- his economic injuries in an amount not less than $250,000.00;
-
- 4. Liquidated damages under 42 U.S.C. 2000aa;
-
- 5. An award of plaintiff's reasonable attorney fees and
- costs incurred herein pursuant to 42 U.S.C. 1988; and
-
- 6. An award of such other relief in law and equity that
- this Court deems just and proper in the premises.
-
- JURY DEMAND
-
- Plaintiff demands the within facts be tried to a jury.
-
-
-
- Respectfully submitted,
-
- SIRKIN, PINALES, MEZIBOV & SCHWARTZ
-
-
-
-
-
- H. LOUIS SIRKIN
- Ohio Bar No. 0024573
-
-
-
-
- MARC D. MEZIBOV
- Ohio Bar No. 0019316
-
-
-
-
- LAURA A. ABRAMS
- Ohio Bar No. 0056183
- 920 Fourth & Race Tower
- 105 West Fourth Street
- Cincinnati, Ohio 45202
- Telephone (513) 721-4876
- Telecopier (513) 721-0876
-
- Attorneys for Plaintiff
-
- ------------------------------
-
- Date: Fri, 21 Jul 1995 09:38:59 -0400 (CDT)
- From: Bob Izenberg <bei@dogface.austin.tx.us>
- Subject: File 2--Kyl and Leahy to Introduce Anti-Hacker Bill
-
- This came from volume 15 issue 311 of TELECOM Digest:
-
- Date--Thu, 20 Jul 95 07:52:59 MST
- From--John Shaver <shaverj@huachuca-emh17.army.mil>
-
- Forwarded to TELECOM Digest, FYI.
-
- From--info@kyl.senate.gov at WOODY
- Date--7/11/95 1:41PM
-
- FOR IMMEDIATE RELEASE CONTACT: Liz Hickey
- Wednesday, June 21, 1995 (202) 224-4521
-
- KYL AND LEAHY TO INTRODUCE ANTI-HACKER BILL
-
-
- (Washington, D.C.) -- Senator Jon Kyl (R-AZ) and Senator Patrick
- Leahy (D-VT) will introduce a bill next week that responds to the
- rapidly increasing sophistication of computer crime by criminalizing
- and toughening penalties for a host of computer security violations.
-
- The bill makes it a felony for a hacker to inflict reckless damage
- on a computer system. It also makes it a felony for an authorized user
- to inflict intentional damage on a computer system. And it criminalizes
- cases where individuals threaten to crash a computer system unless
- access and an account are granted.
-
- "Our national infrastructure, the information that bonds all
- Americans, is not adequately protected," Kyl said. "This bill will
- make criminals think twice before illegally gaining access to computer
- files.
-
- "We have a national anti-stalking law to protect citizens from
- harrassment, but it doesn't cover the equivalent of stalking on the
- communications network. We should not treat these criminals differently
- simply because they injure us in other ways."
-
- Reports demonstrate that computer crime is on the rise. The
- Computer Emergency and Response Team (CERT) at Carnegie-Mellon
- University found computer intrusions have increased from 132 in 1989
- to 2,341 in 1994.
-
- A report commissioned last year by the Department of Defense and
- the CIA states "[a]ttacks against information systems are becoming
- more aggressive, not only seeking access to confidential information,
- but also stealing and degrading service and destroying data."
-
- Current law punishes only those who trespass AND adversely affect
- the use of a government computer. The bill treats viewing information,
- even when no theft or damage occurs, as a criminal offense. In this
- situation, privacy and security have been breached.
-
- "The system administrator in these cases must spend time, money,
- and resources to restore security," Kyl said. "We can no longer accept
- trespassing into computers and viewing information as incidental just
- because the information isn't stolen or damaged."
-
- The "Kyl/Leahy National Information Infrastructure Protection Act
- of 1995" adds a statute to allow prosecutors to fight interstate and
- foreign transportation of stolen computer files. And it ensures that
- repeat computer crime offenders are subject to harsher penalties.
-
- ------------------------------
-
- Date: Sat, 22 Jul 1995 21:49:28 -0500 (CDT)
- From: David Smith <bladex@BGA.COM>
- Subject: File 3--Computer Porn Conviction: New Thought Control (fwd)
-
- ---------- Forwarded message ----------
- From--bc880@freenet.toronto.on.ca (Marcus Shields)
- Subject--Computer Porn Conviction--New Thought Control
-
- Internet users- particularly those in Canada- concerned about government
- attempts to "crack down on Internet perverts" should take careful note of
- the following article exerpted from the Toronto Star newspaper:
-
- COMPUTER PORN CONVICTION A FIRST
-
- A 20-year old Mississauga man will be sentenced July 20 for
- creating and distributing child pornography on a computer
- bulletin board.
-
- It is the first reported conviction under Canada's two-year-old
- kiddie porn law involving computer production and distribution.
-
- "The materials are pretty disgusting, _but_at_this_stage_they're_
- _all_his_fantasy,_all_the_workings_of_his_perverted_mind",
- (emphasis added) assistant crown attorney Philip Enright said of
- Joseph Pecchiarich, 20.
-
- <snip>
-
- ..."What he would do is take his scanner and run the scan over a
- totally innocent picture of a child, say a 5-year old girl
- modelling a bathing suit," Enright explained.
-
- "Then, when it was transposed on to his screen, with the software
- that he had on his computer he was able to remove the clothing
- and add genitalia and then he would put the child in a sexually
- provocative position."
-
- <snip>
-
- So, there we have it, fellow Canadian computer users; merely
- harbouring thoughts of having sex with children is now an offense
- that will be zealously tracked down by the police and prosecuted
- to the fullest extent of the law.
-
- Now, the fascinating thing about the Pecchiarich case, in eerie
- similarity to the recent Eli Langer "obscene art" prosecution in
- Toronto, is that in both these cases of alleged "child pornography",
- there is one rather minor (pun intended) missing element. To wit,
- CHILDREN. If you will cast your mind back to the situation several
- years ago when the Mulroney government passed the "child pornography"
- law (over the bitter objections of the civil liberties lobby, and
- virtually without serious debate in Parliament, partly because it
- was near the end of the session but mainly because even the NDP had
- been cowed into silence by overwhelmingly conservative public
- opinion), the entire premise upon which this law was passed was, "to
- protect children from sexual abuse".
-
- But in both the Peccharich and Langer cases, no children- indeed, no
- living beings of any kind- were involved at any stage of the process.
- What these individuals WERE prosecuted for, is publicly expressing
- thoughts that conservative society abhors- to wit, child sexuality.
- Now, I'm strongly against the PRACTICE of children being involved in
- sexual conduct, too- but, if we accept the idea that merely
- communicating an idea that society doesn't like can be subject to
- criminal prosecution, where do we draw the line? Suppose Peccharich
- had used his computer to retouch a picture of Mila Mulroney so she
- appeared to be in bondage? What if he doctored a picture of Jean
- Chretien or Bill Clinton so it appeared that Bill or Jean had been
- assassinated? Why is it OK for society to punish someone for
- publishing thoughts of deviant sex, but not OK to punish someone for
- imaginary depictions of murder? (Time to pull _True_Lies_ from the
- video store, I guess.)
-
- Well, you might want to discuss this issue with your fellow Net
- users.
-
- As long as doing so is still legal in the eyes of the police.
-
- ------------------------------
-
- Date: Wed, 28 Jun 1995 18:23:51 EST
- From: "Rob Slade, Social Convener to the Net" <roberts@MUKLUK.HQ.DECUS.CA>
- Subject: File 4--"Computer Privacy Handbook" by Bacard
-
- BKCMPRHB.RVW 950418
-
- %A Andre Bacard abacard@well.com
- %C 2414 6th St., Berkeley, CA 94710
- %D 1995
- %G 1-56609-171-3
- %I Peachpit Press
- %O U$24.95/C$31.95 510-548-4393 fax: 510-548-5991 800-283-9444
- %O trish@peachpit.com gary@peachpit.com
- %P 274
- %T "Computer Privacy Handbook"
- "Computer Privacy Handbook", Andre Bacard, 1995, 1-56609-171-3, U$24.95/C$31.95
-
- After the three prior works on PGP and related issues, Bacard's book
- reads like a popular magazine article. Unfortunately, this is not
- necessarily an advantage.
-
- Part (chapter?) one is a general overview of privacy as related to
- computers. The examples and arguments used, though, are chosen from
- such a broad spectrum that they actually weaken the position in favour
- of privacy and confidentiality. Most of the anecdotes relayed in the
- book have little to do with computers. The majority have to do with
- governmental or corporate activities over which the individual has no
- say. None bear on the function of PGP (Pretty Good Privacy) -- to
- encrypt local files and, in particular, those sent over public email
- channels.
-
- Chapter two discusses encryption in general terms. *Very* general
- terms. There is no attempt to grasp or present any technical material
- here. This prevents Bacard from noting the silliness of statements
- that "high-quality crypto" is "impossible" to break, or that methods
- of attack have not been publicly identified. First, this sounds
- suspiciously like "security by obscurity". Second, an awful lot of
- people *do* know how to break PGP -- and they know exactly how long it
- will take. (By the way, it was Ken Follett, not the Germans, who used
- "Rebecca" as a code key.) The discussion of ITAR (the International
- Traffic in Arms Regulation of the US government) does not provide
- enough detail to explain the difficulties Phil Zimmermann faces, nor
- the problems in getting PGP overseas. The coverage of Clipper,
- however, is excellent.
-
- The overview of PGP given in chapter three is a fair enough
- description, but completely avoids touching on Zimmermann's
- difficulties with the US federal government or RSA Data Security. The
- pointers on how to get PGP are useless unless you want to buy
- ViaCrypt's version. The US sites all have limitations, and usually
- some form of authentication before you can access the files. The
- international versions are illegal in the US because of patent issues.
-
- Chapter four is documentation for the commercial version of PGP.
-
- While the Stallings (cf. BKPRTPRV.RVW), Garfinkel (cf. BKPGPGAR.RVW)
- and Schneier (cf. BKEMLSEC.RVW) works are written by technical experts
- and contain technical background, they are not impossible for the
- layman to understand. This work, therefore, fails in a number of
- respects, and brings little to the subject which has not been said
- before.
-
- copyright Robert M. Slade, 1995 BKCMPRHB.RVW 950418
-
- ======================
- ROBERTS@decus.ca, RSlade@sfu.ca, Rob Slade at 1:153/733
- RSlade@cyberstore.ca The Internet interprets censorship as damage and
- routes around it - J. Gilmore Author "Robert Slade's Guide to Computer
- Viruses" 0-387-94311-0/3-540-94311-0
-
- ------------------------------
-
- Date: Sun, 19 Apr 1995 22:51:01 CDT
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 5--Cu Digest Header Info (unchanged since 19 Apr, 1995)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CUDIGEST
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: Bits against the Empire BBS: +39-464-435189
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu:80/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #7.62
- ************************************
-
-