home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Wed Jul 26, 1995 Volume 7 : Issue 63
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
-
- CONTENTS, #7.63 (Wed, Jul 26, 1995)
-
-
- File 1--Correction to Cincinnati BBS Document (CuD 7.62)
- File 2--The Case of the Two Cybersex Studies
- File 3--"Imprisonment wihouth Guilt" for "Hacking"
- File 4--[to GovAccess] sample of VTW's *stellar* tech-civlib alerts!
- File 5--Cu Digest Header Info (unchanged since 19 Apr, 1995)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: 25 Jul 95 10:56:35 EDT
- From: Lance Rose <72230.2044@COMPUSERVE.COM>
- Subject: File 1--Correction to Cincinnati BBS Document (CuD 7.62)
-
- That legal paper you published in 7.62 is not a criminal
- indictment, but a civil complaint. For a few moments, I had the
- bizarre experience of thinking I was seeing a prosecutor trying to put
- his own people in jail <g>.
-
- ------------------------------
-
- Date: Mon, 24 Jul 1995 09:42:49 -0700 (PDT)
- From: D B McCullagh <declanm@NETCOM.COM>
- Subject: File 2--The Case of the Two Cybersex Studies
-
- Distribute Freely
-
-
- The Case of the Two Cybersex Studies, (c) 1995
- By Declan McCullagh
- declanm@netcom.com
- July 24, 1995
-
-
- Dr. Michael Mehta's telephone rang.
- "Hi, this is Marty Rimm calling from Carnegie Mellon
- University. I'm the principal investigator of a study on pornography,
- and I'm leading a 15-person interdisciplinary research team. I'd like
- to take a look at the research you presented earlier this month."
- Mehta, then a graduate student at York University in Ontario,
- remembers answering the phone last fall. He never thought then that an
- unexpected phone call from Marty Rimm would bring him to accuse the
- former Carnegie Mellon student of stealing his ideas and his research
- eight months later.
- When he first talked to Rimm, he was flattered to be contacted
- by what he thought was a senior professor at a prestigious university.
- He tried to help the researchers at Carnegie Mellon University.
- "Rimm asked for a copy of my paper that I presented at a
- conference in November. He said Carnegie Mellon was publishing a book,
- and he might include my paper as a chapter if I sent it to him," says
- Mehta.
- Mehta and Dwaine Plaza, also of York University, had studied
- how adult BBS operators were marketing pornography on the information
- superhighway. After the two researchers sent "everything they had" to
- Rimm, they waited hopefully but never heard from him again.
- "I feel like a total fool now," says Mehta. "I was under the
- impression that Rimm was a tenured faculty member. He never corrected
- me when I called him 'professor Rimm.'"
- He didn't know about the controversy Rimm's paper had caused
- until last week, when an associate at the University of Waterloo told
- readers of a cyberlaw mailing list that Mehta and Plaza presented a
- cybersmut paper at a conference last November. Then researchers and
- reporters started calling Canada.
- Mehta is "flabbergasted" by the publicity Rimm's paper has
- generated "down south." His local papers haven't covered Rimm's study,
- so he wasn't aware of the controversy its publication caused. Now a
- post-doctoral fellow at Queen's University, he had given up hope of
- publishing his paper and moved on to researching democratic rights and
- public accountability for technology.
- After learning that Rimm was an undergraduate, Mehta felt
- silly at first. But after he read Brock Meeks' CyberWire Dispatches,
- he became convinced of the "seriousness of this issue" and decided to
- go public with his concerns.
- Rimm reportedly has retained a lawyer and has declined to
- comment.
- "It's funny how a breakdown in trust between people who have
- never met can happen over the wires," Mehta says. "I trusted Rimm, and
- he stole some of our ideas, lied to me, and distorted facts beyond
- belief."
- Looking back, he says Rimm's behavior was peculiar. He
- remembers asking Rimm for a copy of the book he was writing. "Rimm
- said there was an export restriction on it -- his publisher said there
- was an export ban," Mehta says.
-
- Studying CyberSmut: Similarities and Differences
-
- "I don't think the parallels between the two studies are
- coincidences. There are a lot of similarities that can't be accounted
- for by chance," says Mehta, who's working to document the resemblances.
- Rimm's paper, published in the July issue of the Georgetown
- Law Journal and cited on the front page of Time magazine, never
- mentions Mehta's study.
- Mehta says that Rimm changed the direction of his research
- without giving the York University researchers credit: "Rimm wasn't
- looking at the commercial distribution of BBS pornography until he
- spoke with us in November. We told him that we were looking for adult
- BBS logos and telephone numbers in Usenet images."
- Rimm's study claims that he downloaded and reviewed Usenet
- images in September, but doesn't say when they were analyzed.
- His study also lingers on the salacious details of erotica,
- repeating words like "fuck," "cock," "pedophile," and "paraphilia"
- dozens of times. "We also started off with emotionally laden language.
- But in the end, we cut down those terms," says Mehta. "That's what the
- Journal of Sex Research wanted. You think law journals are tough? Try
- peer review!"
- The Carnegie Mellon study somewhat resembles the Mehta-Plaza
- study, yet it also differs in many ways:
- * Rimm talks about pornography on adult BBSs, the Internet,
- Usenet, and the World Wide Web. The Canadian study only looks at
- images, many from adult BBSs, appearing on a small selection of Usenet
- newsgroups.
- * Rimm reviews descriptions of hundreds of thousands of
- images. The other study looked at the actual images, but only at a
- few hundred.
- * Rimm sorts images into only one category. The York
- University study categorizes each image in 22 different ways.
- * Rimm waxes poetic about how "pornography permeates the
- digital landscape." Plaza and Mehta discuss "a symmetric measure of
- association for 2x2 crosstabulations used when comparing
- non-parametrically distributed variables."
- Some of the Mehta-Plaza study's findings contradict Rimm's.
- Since the Canadian researchers actually looked at the images, they
- found that many "bestiality" images were actually cartoons: "There
- were only a few actual digitized photographs in our sample showing
- such acts."
- Also, where Rimm talks about "the ease of copying and
- disseminating digitized child pornography," the Canadian researchers
- say they found "no actual images showing a sexual act with children or
- adolescents."
- After presenting their paper at the November 1994 "Symposium
- on Free Speech and Privacy in the Information Age," Plaza and Mehta
- tried for months to find a publisher, but were stonewalled by the
- Journal of Sex Research. "They didn't like our findings," says Mehta.
- The journal's editors reportedly also disliked the references to
- anti-porn activist Catherine MacKinnon.
- Ironically, MacKinnon published a commentary on Rimm's research
- in the most recent Georgetown Law Journal, hailing it as a "landmark
- study of pornography in cyberspace."
- While both papers conclude that adult BBS operators are using
- the Internet to market their images, some recent evidence suggests the
- practice may not be widespread. Brian Reid, a network researcher and
- Usenet guru at Digital Equipment Corporation, says adult BBS operators
- become upset when their images appear surreptitiously on Usenet
- newsgroups. When they find out, they demand that the images be
- removed.
- Donna Hoffman, an associate professor of management at
- Vanderbilt University, agrees: "On the supply side, the operators
- realize that such 'leakage' hurts the market. On the demand side, the
- potential customer will say, 'Why should I pay over there when I can
- see it here for free?'"
- Whatever the reality, after all this controversy, there may be
- a happy ending in store for the pair of researchers. Mehta says he was
- ready to give up on publishing their study, but now "our paper will
- help shed a little light on this issue." In the wake of the Rimm
- scandal, he thinks they'll have better luck finding a journal to
- accept it.
-
- [Since his paper has not been published, Mehta decided not to put it
- online. He has agreed to answer questions about it and can be reached
- at: mm39@post.queensu.ca]
-
-
-
- A: ABSTRACT
-
- "A content analysis of pornographic images on the Internet"
- By Michael D. Mehta and Dwaine E. Plaza
-
- This paper examines the nature and content of 150 randomly selected
- pornographic images available through newsgroups located on the
- Internet computer network. Using content analysis, we identify themes
- which appear most frequently, and explore differences in the type of
- material posted by commercial and non-commercial users. Results
- suggest that commercial vendors are more likely to post explicit
- pornographic material in public access newsgroups in order to attract
- new customers to their private, pay-per-use bulletin board services.
-
-
-
- B: PARALLEL CONSTRUCTIONS
-
- Following are examples of where the two studies express similar ideas.
- Page numbers are in parentheses. Since both studies talk about similar
- topics, many parallel constructions could be coincidences. Rimm never
- mentions the Mehta-Plaza study in his paper.
-
- ------------------------------------------------------------------------------
- RIMM STUDY MEHTA/PLAZA STUDY DRAFT
- ------------------------------------------------------------------------------
- (1867) 17 of the 32 alt.binaries (7) 17 Usenet newsgroups were
- Usenet newsgroups contained identified that contained sexually-
- pornographic imagery oriented images
- ------------------------------------------------------------------------------
- (1865) Images are also posted to (16) Other newsgroups besides
- newsgroups outside the alt.binaries those studied may contain
- hierarchy sexually-explicit images
- ------------------------------------------------------------------------------
- (1914) Pornography is widely (13) Pornography on computer
- available through computer networks networks is widely available
- ------------------------------------------------------------------------------
- (1852) Pornography is being vigorously (14) Commercial distributors
- marketed in computer environments of pornography use the Internet to
- market it
- ------------------------------------------------------------------------------
- (1851,1875) Pornographers are using (14) Commercial distributors of
- Usenet newsgroups to advertise pornography post images to newsgroups
- products and attract customers to attract customers
- ------------------------------------------------------------------------------
- (1868) The role of the NSFnet (4) The role of the NSF backbone
- backbone began to change is now changing
- ------------------------------------------------------------------------------
- (1862) The Internet is increasingly (3) The Internet has the potential
- being used by pornographers to disseminate pornography
- ------------------------------------------------------------------------------
- (1861) One of the largest uses for (4) The distribution of pornography
- computer networks is the distribution is a new use for computer networks
- of sexually explicit imagery
- ------------------------------------------------------------------------------
- (1910) Pornographers are using (6) Commercial vendors may see
- newsgroups to advertise at no cost newsgroups as a way to advertise
- freely.
- ------------------------------------------------------------------------------
- (1862) Until recently, the primary (4) Until recently, the primary use
- use of the Internet was linking of the Internet was for scientific
- university and government computers research purposes
- for research purposes
- ------------------------------------------------------------------------------
- (1868) Multimedia graphics are being (16) There are more advanced types
- developed of image files which simulate
- movement
- ------------------------------------------------------------------------------
- (1885) The presentation of kappa (10) Kappa coefficients were
- values was unnecessary because of the calculated and indicated a good
- high level of reliability * degree of inter-coder reliability
- ------------------------------------------------------------------------------
- (1916) The study lists 4 boldfaced (22) The study lists 22 categories
- categories and 18 additional ones
- ------------------------------------------------------------------------------
- (1852) Consumers enjoy considerable (5) Users download images in
- privacy while downloading images from the privacy of their offices
- computer networks
- ------------------------------------------------------------------------------
- (1875) An adult BBS sysop can find (14) Most images come from magazines
- images in magazines or videotapes
- ------------------------------------------------------------------------------
- (1912) Raises questions about (17) Says the Internet has the
- community standards in cyberspace potential to undermine local laws
- ------------------------------------------------------------------------------
- (1908) Lawmakers are grappling with (18) Content of computer pornography
- digitized pornography and may decide will change with regulation of
- to regulate the Internet the "global village."
- ------------------------------------------------------------------------------
- (1853) It may be difficult for (17) It is necessary for others
- researchers to repeat this study to replicate this study
- ------------------------------------------------------------------------------
- (1875) Adult BBS operators are more (14) Commercial operators are
- likely to post explicit pornography ** more likely to post explicit
- pornography
- ------------------------------------------------------------------------------
-
- * = Mehta says: "The kappa coefficient came right from us. He asked how we
- calculated reliability, and we told him. It's in there, but he didn't use it.
- I don't think he knew how."
-
- ** = Rimm's study says that adult BBS owners post 71% of hardcore
- pornography but just 59% of the combined total of hardcore and
- softcore pornography.
-
-
-
- C: ESTIMATES OF WORD OCCURRENCES (1)
-
- Note the highly emotional words Rimm uses in his study. Where
- Mehta-Plaza use the term "commercial vendor," Rimm uses "pornographer."
-
- Mehta-Plaza Study Rimm Study (2)
- ----------------- ----------
- Paraphilia / Paraphilic 0 82
- Pornographer 0 70
- Child (3) 1 52
- Hard-Core 0 52
- Bestiality 2 45
- Pedophilia / Pedophile / Pedophilic 0 41
- Commercial 42 39
- Dog / Horse 0 23
- Fisting 0 22
- Obscene 0 21
- Cock 0 21
- Fuck 0 21
- Incest 2 17
- Pussy 0 17
- Pain 0 15
- Abuse 0 7
- Torture 0 7
- Penis 7 4
- "She holds the dog cock! Inserts
- it in her daughter's ass!" 0 2
-
- (1) Since the counting technique isn't perfect the data shouldn't be
- seen as exact. Also, Rimm's paper is considerably longer so one would
- expect a word to occur more often.
-
- (2) To obtain these figures, the Mehta-Plaza paper was saved to a file
- with the references and Table 1 included. The Rimm paper and footnotes
- from http://trfn.pgh.pa.us/guest/mrstudy.html were saved in a single
- file. The following command sequence was used to extract word counts
- from the two files:
-
- tr '\040' '\012' < {study} | fgrep -i {word} | wc -l
-
- (3) Usually used in the phrase "child pornography." In this case, data
- were reviewed manually for accuracy. The one use of the word "child"
- in the Mehta-Plaza study was: "We never came across an image depicting
- a sexual act between an adult and a child/adolescent or acts between
- children."
-
- ------------------------------
-
- From: Emmanuel Goldstein <emmanuel@2600.COM>
- Subject: File 3--"Imprisonment wihouth Guilt" for "Hacking"
- Date: Tue, 25 Jul 1995 16:20:27 -0400 (EDT)
-
- What follows is a letter from Bernie S., who has been in prison for
- over four months, held with no bail for possessing a red box and
- cellular software. Please help get his words to the public. I've
- been trying to get EFF and EPIC people involved in what I believe
- is a milestone case and one which will affect a lot of people in
- the future. I'm utterly disgusted at the lack of response I've
- gotten from them so far.
-
- emmanuel@2600.com
-
-
- --------------------------------------------------------------------
-
- THIS IS A COPY OF A LETTER FROM ED CUMMINGS (BERNIE S.)
- WHO IS STILL IN FEDERAL PRISON IN NEW JERSEY. HIS TRIAL
- IS SCHEDULED FOR THE END OF THE MONTH - YOU MAY HAVE
- THE ABILITY TO DO SOMETHING TO HELP WITH HIS CASE. PLEASE
- SPREAD THE WORD AND READ THE NEW LAWS THAT HE CITES -
- THIS IS A CASE THAT WILL AFFECT A GREAT MANY PEOPLE.
-
-
-
- July 10, 1995
-
- This week marks four months of imprisonment without having been
- found guilty of any crime.
-
- I'm enclosing a copy of the United States Code (U.S.C.) Title 18,
- ss1029. The two statutes I'm charged with are: ss1029(a)(6)(B) (one
- count) for possession of cellular software on the hard drive of my
- laptop, and ss1029(a)(5) (two counts) for possessing a modified
- Telecommunications Instrument (a modified Touch-Tone dialer). These
- two amendments to ss1029 were enacted by Congress on October 21,
- 1994 after heavy lobbying by the cellular industry. Any discussion
- of my case without understanding this new legislation is
- unproductive.
-
- The statutes are worded as follows:
-
- ---------------
-
- ss1029. Fraud and related activity in connection with access
- devices
-
- (a) Whoever -
-
- ...
-
- (5) knowingly and with intent to defraud uses, produces, traffics
- in, has control or custody of, or possesses a telecommunications
- instrument that has been modified or altered to obtain unauthorized
- use of telecommunications services; or
-
- (6) knowingly and with intent to defraud uses, produces, traffics
- in, has control or custody of, or possesses -
-
- (A) a scanning receiver, or
-
- (B) hardware or software used for altering or modifying
- telecommunications instruments to obtain unauthorized access to
- telecommunications services.
-
- ---------------
-
- It's important to note that the government is not alleging that
- I've "acted" illegally. I'm not being charged with "cloning",
- selling, or using any illegally cloned cellular phones, possessing
- fraudulent or stolen Electronic Serial Numbers (ESN's), possessing
- any equipment or software enabling the acquisition of others'
- ESN's, or selling or using any "Red Boxes". The government's
- charges against me are solely that I had the "intent" to use
- software or hardware to violate new federal laws.
-
- Until very recently, the federal statutes used to prosecute those
- accused of defrauding telecommunications carriers relied on the
- "access device" definition embodied in ss1029. That definition
- (which was actually worded years ago in an effort to curb
- credit-card fraud) failed to adequately describe certain types of
- fraud involving "ESN/MIN tumbling" cellular phones, blue boxes, red
- boxes, etc. because none of these devices accessed a specific
- person's account. The government was having trouble prosecuting
- these cases because the laws didn't fit the crime. Last October 21,
- at the behest of telecommunications and cellular industry
- lobbyists, Congress quietly enacted two amendments to ss1029 that
- neatly sidestep the long-standing and well-defined phrase "access
- device" by using undefined terminology which can be interpreted so
- broadly it can be applied to just about anything the government
- wants. With the passage of ss1029(a)(5) and (a)(6)(A) and
- (a)(6)(B), it can now be a federal felony to possess, use, sell, or
- lend anything that might enable anyone to obtain "unauthorized use"
- or "unauthorized access" to telecommunications services - neither
- of which the law defines. Other terminology like "altered",
- "modified", and "telecommunications instrument" are also
- conveniently undefined.
-
- With regards to the "hardware or software used for altering or
- modifying telecommunications instruments" mentioned in
- ss1029(a)(6)(B), the government is ostensibly trying to prevent
- people from reprogramming the ESN & MIN in cellular phones, as well
- as the identifying information in any future PCS devices that are
- coming out in the future. ESN's are easily and commonly
- reprogrammed to allow one subscriber to have two or more cellular
- phones on the same account - something that cellular carriers would
- rather tell subscribers is impossible and that they have to setup
- separate accounts with different phone numbers and additional
- $20-$40/month "access fees" for each phone. The MIN, or phone
- number, is easily reprogrammed from the keypad of all modern
- cellular phones, and the associated ESN can be reprogrammed by
- using a PC connected to the phone's data port with the proper
- software. Since the government doesn't define "alter" or "modify"
- but clearly intends it to mean changing the contents on data in a
- memory chip, and since it also fails to define "unauthorized use"
- and "unauthorized access", it opens up a Pandora's box of potential
- violations of these new felony statutes.
-
- For instance, the practice of storing commonly-called telephone
- numbers in a cellular phone (some have up to 200 memories for this)
- is also, by the same implied definition, "altering" or "modifying"
- that "telecommunications instrument". "Unauthorized use" is not
- defined in the statutes, but could be interpreted to mean calling
- someone who doesn't want to be called. Simply dialing a number on
- a cellular phone "alters" and "modifies" the contents of memory
- addresses in microchips contained in that phone. So does dialing
- someone who doesn't want to be called constitute a felony under
- this statute? FCC regulations prohibit transmission of profanity
- over the airwaves. Cellular telephones are actually computerized
- two-way radios. Does using profane language during a cellular
- telephone conversation then constitute "unauthorized use" under
- s1029(a)(5), making participants felons? As you know, a casual scan
- of the 825-895 Mhz radio spectrum that cellular radiotelephones use
- (which itself is now a federal felony!) would expose a whole lot of
- felons (profanity abounds).
-
- There are other problems with these amendments. Title 18
- ss1029(a)(6)(a) makes it a federal felony to possess "a scanning
- receiver". I believe this statute tries to address the users of so
- called "ESN grabbers" that intercept the reverse-channel data
- transmissions of cellular telephones. These data streams can be
- demodulated and contain the ESN/MIN pairs that illegal cellular
- cloners use to program into other cellular phones to charge calls
- to the legitimate customers' accounts without their knowledge.
- Unfortunately, the drafters of this legislation didn't bother to
- consider that "scanning receivers" of many types are sold by the
- tens of millions at stores all over the country for perfectly
- reasonable purposes. Scanning radios are used by enthusiasts
- worldwide to listen to public-service radio traffic (i.e., police,
- fire, ambulance, weather, municipal, etc.), and all modern
- digitally-tuned radios in cars and home stereos utilize "scanning"
- functions for easy tuning. Maybe there was some underlying intent
- to outlaw the millions of radios out there that can easily monitor
- law enforcment frequencies; perhaps the government's paranoia has
- extended this far. In any case, this is clearly a bad law, and I
- could go on and on as to why. The only way to change these
- badly-worded amendments is to lobby (i.e. buy) Senators and
- Congresspersons to propose and pass new legislaton amending these
- bad laws so that they make sense. The cellular industry did just
- that in 1986 with the ECPA (Electronic Communications Privacy Act)
- and in 1994 with these amendments to USC 18 ss1029. Unfortunately,
- those of us who care about changing these bad laws don't have the
- money or the influence to buy legislation.
-
- Although I haven't read the several page article about my case in
- the summer issue of 2600, I'm disappointed there was no mention of
- the legislation that made this entire episode possible. To me,
- that's the real story.
-
- My trial is scheduled for July 31 at 10:00 AM in coutroom 9-B
- (ninth floor) of the US Federal Courthouse at 601 Market Street in
- Philadelphia. If any of this changes, I'll let you know. There are
- some pending pretrial defense motions but whether the judge decides
- to hear them before July 31 remains to be seen. I'm extremely
- frustrated having been held for over four months in pretrial
- detention because it makes preparing a defense virtually impossible
- given my inaccessibility to normal resources.
-
- If you read over the enclosed summary of the BRADY case (which
- involved someone who was allegedly selling "Tumbling MIN/ESN
- celullar phones") you will see that government "expert" witnesses
- are capable of making all kinds of misstatements of facts, either
- out of incompetence or intention. If this occurs during my trial
- (which I believe is entirely possible) I will have to present
- expert witnesses to counter the government's. Is a jury of 12
- technically untrained people going to believe a United States
- Secret Service Agent who specializes in telecommunications and
- computer fraud, or someone I come up with who claims the agent
- doesn't know what he's talking about? It all comes down to
- credibility, not about what's right and wrong.
-
- The government has unlimited resources to prosecute this case, and
- I'm broke. I can't even afford to hire any expert witnesses, let
- alone someone of the stature necessary to credibly counter the
- government's experts. Do me a big favor and put word out that I
- need expert witnesses with that kind of credibility. The only thing
- I can offer them is the notoriety and publicity of presenting their
- expertise at a highly publicised trial.
-
- This case is legally significant because its outcome will set a
- legal precedent on which future cases of this type are based. The
- two statutes I am charged with are untested - no one has ever been
- convicted of them. This case WILL be in the law books, one way or
- another. Its outcome will affect many people in the future. There
- are also Constitutional issues at stake. Do we really want the
- government to be able to imprison anyone for publishing a computer
- program? Or for possessing readily-available electronic components
- that can be purchased at Radio Shack and other companies
- nationwide? That's what this case amounts to. Again, I'm not even
- being accused of committing any fraud, just possessing software and
- commonly available components that the government says show I had
- the INTENT to commit fraud. The ramifications are frightening - not
- just for me, who could spend years in federal prison, and be
- labeled a federal felon the rest of my life - but for anyone else
- whose curiosity extends to computers, telecommunications, software,
- and electronics. If I am convicted, the government can declare
- open-season on anyone fitting that profile, just as they do now on
- people fitting "drug courier profiles". Hackers, phreaks, and
- computer and electronics hobbyists will all be fair game.
-
- Please get the word out on what I'm saying here. Implore people to
- write their legislators to amend these bad laws. It's a long-shot,
- but negative publicity might help to get the government to back
- down.
-
- This has been an extremely stressful and depressing ordeal for me.
- It has resulted in the loss of my job (all my clients have had to
- turn elsewhere), my life savings, several months of my life (maybe
- more), it's affected my health (I've repeatedly been denied access
- to the physical therapy that my orthopedic surgeon says is
- necessary for me to regain the use of my arm), and generally been
- a living hell. I don't want anyone else to have to go through this
- nightmare. Please do what you can, and encourage others to do the
- same. It may not make a difference, but then again it might. At the
- risk of sounding grandiose, how this case is decided truly impacts
- out entire community.
-
- I hope to see the EFF and/or EPIC actively involved in my case.
- Either organization might have information my attorney can use.
- Anyone who needs to can contact him, Ken Trujillo, at
- ktrujillo@aol.com.
-
- Thanks again for all your help on this as it comes down to the
- wire. It's extremely frustrating to have to rely on others to do
- things that I'd be perfectly capable of doing myself if I weren't
- locked up in here. Times like these make you realize who your
- friends really are.
-
- Ed Cummings 48919-066
- FCI Fairton
- A-Left
- P.O. Box 420
- Fairton, NJ 08320
-
- bernies@2600.com
-
- ------------------------------
-
- Date: Sun, 23 Jul 1995 13:52:45 -0700
- From: Jim Warren <jwarren@well.com>
- Subject: File 4--[to GovAccess] sample of VTW's *stellar* tech-civlib alerts!
-
- I cannot recommend Voters Telecomm Watch too highly to my GovAccess readers.
-
- If you care about the barrage of attacks that naive and/or ignorant and/or
- arrogant and/or flat-out irresponsible, pandering, media-seeking
- politicians are proposing to inflict on traditional civil liberties - using
- the singular excuse that such liberties are aided by computer - I *urge*
- you to subscribe to VTW.
-
- Except for its most crucial, time-sensitive action-alerts, I will not be
- duplicating VTW's *excellent* content to GovAccess in the future. Git it
- direct!
-
- --jim
-
-
- &&&&&&&&&&&&&&&&&&&&
-
- Date--Sat, 22 Jul 1995 09:20:15 -0400
- From--shabbir@panix.com
- Subject--(Weekly) VTW Billwatch #10
-
- ============================================================================
- VTW BillWatch: A weekly newsletter tracking US Federal legislation
- affecting civil liberties. BillWatch is published every
- Friday afternoon as long as Congress is in session.
-
- Issue #10, Date: Sat Jul 22 00:55:27 EDT 1995
-
- Please widely redistribute this document with this banner intact
- Redistribute no more than two weeks after above date
- Reproduce this alert only in relevant forums
-
- Distributed by the Voters Telecommunications Watch (vtw@vtw.org)
-
- *** Know of someone in NY/NJ with a fax machine but without net ***
- *** access that's interested in VTW's issues? Tell them to ***
- *** call and get on our weekly fax distribution list at ***
- *** (718) 596-2851. ***
-
- To get on the distribution list for BillWatch, send mail to
- listproc@vtw.org with
- "subscribe vtw-announce Firstname Lastname"
- in the subject line.
-
- Email vtw@vtw.org with "send billwatch" in the subject line
- to receive the latest version of BillWatch
- ____________________________________________________________________________
- CONTENTS
- Rumor Central (RC)
- *** Legislative information is unchanged since last week ***
- Internet Freedom and Family Empowerment Act (HR 1978, S n.a.)
- (awaiting official presentation in the House, nothing in Senate)
- 1995 Communications Decency Act (HR 1004, S 314)
- (passed Senate, fight in the House)
- 1995 Protection of Children from Computer Pornography Act
- (HR n.a., S 892, Senate hearing scheduled for July 24th)
- Anti-Electronic Racketeering Act of 1995
- (HR n.a., S 974, not currently moving in the Senate)
-
- ____________________________________________________________________________
- RUMOR CENTRAL (RC)
-
- "The Net: under attack again"
-
- Whenever pro-censorship forces attack the Internet, they
- trot out kids who have been "cyber-stalked" or have found
- pornography online. Unfortunately what you never hear about
- is kids using the net in exciting ways because it doesn't make
- good sensationalistic news.
-
- Do you know of a young child using the Internet with their
- parent's permission? Their input is needed THIS WEEKEND.
- Please contact VTW at vtw@vtw.org, or by phone at (718) 596-2851.
- The information will be put into the Congressional Record by
- anti-net-censorship legislators to counter the pro-censorship
- hysteria.
-
- Remember, please contact us THIS WEEKEND.
-
-
- "Dole/Grassley hearings Monday"
-
- Followers of BillWatch will note that Monday, July 24th, marks
- the Dole/Grassley hearings on S 892 (1995 Protection of
- Children from Computer Pornography Act). When you hear about
- the hearing through the media (we won't be able to get it
- through the Congressional Record) you're going to flip.
-
- Expect a large collection of people who claim to be the victims
- of "cyber-stalkers". While violence against children is
- abhorred by all reasonable people, you cannot be harmed through
- your computer. One needs to perform a physical act to commit
- such a crime. Let's severely punish and despise the crime, not
- the speech.
-
- If it goes as predicted, the hearing should anger you.
- Remember this the next time you see an alert asking you to call
- Congress. BillWatch looks forward to seeing Brock Meeks'
- review of the hearing.
-
-
- "The Rimm follies"
-
- The text of the Rimm study, and commentary by Anne Wells
- Branscomb, Catherine MacKinnon, and Carlin Meyer can be found
- at:
- URL:http://www.ll.georgetown.edu/rimm.html
-
-
- Send your interesting rumors (anonymously or not) to vtw@vtw.org.
- All mail headers will be destroyed.
-
- ____________________________________________________________________________
- Internet Freedom and Family Empowerment Act (HR 1978, S n.a.)
-
- Description:
- HR 1978 is an attempt to recognize the unique medium that is
- online systems and avoid legislating censorship. It would:
- -prohibit the FCC from regulating constitutionally-protected
- online speech
- -absolve sysops and services from liability if they take
- good faith measures to screen their content or provide
- parental-screening software
-
- See directions below for obtaining analyses from various
- organizations.
-
- House of Representatives, citizen action required:
- Take a moment to read and familiarize yourself with the bill.
- It may be the only time you ever see a bill that *prohibits*
- the FCC from regulating the Internet.
-
- House sponsors: Cox (R-CA), Wyden (D-OR)
-
- House status:
- Currently HR 1978 is being examined by several DC policy groups
- (EPIC, CDT, ACLU, & PFAW) to ensure it won't have any
- undesirable side effects. Therefore, the legislation as
- written may change slightly to correct any problems found.
-
- House actions anticipated:
- Representatives Cox and Wyden will propose their bill and
- the Christian Coalition will propose the Communications Decency
- Act. Although Rep. Gingrich's opposition to the Communications
- Decency Act is encouraging, it isn't clear that it will be enough
- to keep the House from passing another clearly unconstitutional
- bill.
-
- Where to get more info:
- Email: vtw@vtw.org (with "send hr1978" in the subject line)
- Gopher: gopher -p 1/vtw/exon gopher.panix.com
- WWW: http://www.panix.com/vtw/exon
-
- ____________________________________________________________________________
- 1995 COMMUNICATIONS DECENCY ACT (CDA) (Passed Senate, HR 1004)
-
- Description:
- The CDA would criminalize electronic speech currently protected
- in print by the First Amendment.
-
- House of Representatives, citizen action required:
- Call the League of Women Voters in your city and find out who
- your representative is and ask them where they stand. Directions
- can be found by sending mail to vtw@vtw.org with "send alert"
- in the subject line.
-
- House CDA sponsors: Johnson (D-SD)
-
- House status:
- Currently the CDA is unattached to any legislation, however
- it is expected that someone will introduce it as an amendment
- to the Telecomm bill in the next few weeks. In addition,
- three Representatives (Gingrich, Cox, and Wyden) have all taken
- public positions against the Communications Decency Act. Anti-
- censorship legislation (HR 1978) has come out of their objections
- to the CDA.
-
- The palatable Leahy alternative has been attached to the
- House Telecomm Reform bill by an amendment sponsored by
- Rep. Ron Klink (D-4-PA).
-
- House actions anticipated:
- The House Telecomm Reform bill will go to a floor vote
- in mid to late July. The Christian Coalition will find
- someone to try to amend the Communications Decency Act to
- the Telecomm Reform bill. Reps. Cox and Wyden will propose
- their alternative to the bill.
-
- Request the CDA FAQ and familiarize yourself with the issues
- surrounding the bill. Directions below.
-
- Senate, citizen action required:
- None. That battle is lost.
-
- Senate status:
- The Senate affirmed the Communications Decency Act (84-16)
- as amended to the Telecommunications Reform bill (S 652).
-
- Where to get more info:
- WWW: http://www.panix.com/vtw/exon
- http://www.eff.org/
- http://www.cdt.org/
- http://epic.org/free_speech
- Gopher: gopher -p 1/vtw/exon gopher.panix.com
- gopher gopher.eff.org
- Email: vtw@vtw.org (with "send cdafaq" in the subject line)
- cda-status@cdt.org
- cda-info@cdt.org
-
- ____________________________________________________________________________
- 1995 Protection of Children from Computer Pornography Act (S 892)
-
- Description:
- Would make Internet Service Providers liable for shielding
- people under 18 from all indecent content on the Internet.
-
- Senate sponsors: Dole (R-KS), Coats (R-IN), Grassley (R-IA), McConnell (R-KY),
- Shelby (R-AL), Nickles (R-OK), Hatch (R-UT)
-
- Senate status: Currently in the Judiciary committee, scheduled for a
- July 24th hearing. The hearing promises to be a bonanza of
- net porn/stalker hysteria.
-
- Senate citizen action required:
- Request bill and analysis below and familiarize yourself with it.
-
- House of Representatives status: No House version is known about.
-
- Citizen action required:
- None.
-
- Where to get more info:
- Email: vtw@vtw.org (with "send s892" in the subject line)
- WWW: URL:http://www.panix.com/vtw/exon
- Gopher: URL:gopher://gopher.panix.com:70/11/vtw/exon
-
- ____________________________________________________________________________
- Anti-Electronic Racketeering Act of 1995 (HR n.a., S 974)
-
- Description:
- S 974 has many effects (not good) on law enforcement's use of
- intercepted communications. It would also make it unlawful for
- any person to publicly disseminate encoding or encrypting
- software including software *currently allowed* to be exported
- unless it contained a "universal decoding device". This
- more than likely means that Clipper-style key escrow systems
- could be disseminated, but not strong, private cryptography.
-
- Senate sponsors: Grassley (R-IA)
-
- Senate status: Currently not active and probably won't move before the
- August recess.
-
- Senate citizen action required:
- Request bill below and familiarize yourself with it. VTW is
- tracking this bill, and will alert you when there is movement.
- There is no Congressional action to take right now; as other
- bills (such as the Communications Decency Act) pose a greater,
- more immediate threat.
-
- House of Representatives status: No House version is currently enrolled.
-
- Where to get more info:
- Email: vtw@vtw.org (with "send s974" in the subject line)
- Gopher: URL:gopher://gopher.panix.com:70/11/vtw/
-
- ------------------------------
-
- Date: Sun, 19 Apr 1995 22:51:01 CDT
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 5--Cu Digest Header Info (unchanged since 19 Apr, 1995)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CUDIGEST
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: Bits against the Empire BBS: +39-464-435189
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu:80/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #7.63
- ************************************
-
-